Skip to main content

Full text of "PC Today Volume 9 Issue 4"

See other formats


Know Your Business In Real Ti 


Keep Your Devices & Data Safe (R39) 

IT GONE WRONG Spot The Warning Signs (R22) 



m- April 201 1 Vol. 9 Iss. 4 | 

How Cisco Systems, 
Juniper Networks, 
Motorola & Others 
Handle The Problem (P.8) 

$4^9 U.S. $6x99 Canada 


.T* Inmi 

Signup lor he AjUfc F Uness Ne*sl*li*[ 



. :"*^, Agilis FllriiftSi 

Funclkxul mining buML m» muscle j^fc FirBSB ortafs a Lw , 9 a>.^ F dn«s L£; '"' MO-nlnly 

iniNrirHTil -.In-tii;!!! yi>.i iim- ™.ry d;iy tai CI™ Ihis is Ihff bwl of Dolh a ffWP \^Z. Newsletter 


Get started today, call 1-877-GO-1AND1 


"Offers valid through 4/30/2011. 12 month minimum contract term ap 
requires a Windows PC. Domain offers valid first year only. After first y 
to change without notice. 1&1 and the 1&1 logo are trade — 


Table Of Contents 
Volume 9 • Issue 4 • April 201 1 


Solve Wireless Data Overload 

Smartphones and tablets are 
having their day, and some 
networks are beginning to 


Essential Business Tech 

Technology intelligence for 

executives, professionals, 

and entrepreneurs 

For businesses 

network con- 
gestion, there 
are solutions, as 
you'll find in 'The Wireless 
Data Drain" (p.8). Then, 
find out what seven com- 
panies — Aruba Networks, 
BelAir Networks, Cisco 
Systems, Juniper Networks, 
Motorola, Ruckus Wireless, 
and Xirrus — offer in the 
way of wireless solu- 
tions (p. 10) followed by 
a closer look at Juniper 
Networks (p. 12). 


Mobile Office 

Highly useful information for 
conducting business on the road 


The Mobile Workforce 

Business professionals are increasingly mobile, with 
many employers implementing telecommuting policies. 
But is this a positive trend? Generally speaking, mobility 
seems to lead to higher productivity, but the devil is in 
the details. In "Is Telecommuting Right For You?" (p.36), 
we explore telework and find that it's best to ask all the 
right questions before implementing policies. Following 
that is a pair of articles for road warriors: one about mo- 
bile security solutions (p.39) and one about apps that are 
particularly useful for professional travelers (p. 42). 

Personal Electronics 

Electronics, services, and helpful 
advice for home and leisure 


Business Travel 911 

Fast tech support especially 
for traveling professionals 

Product Coverage Inquiries 
(800) 247-4880 
131 West Grand Drive 
Lincoln, NE 68521 


(To adjust your bulk order or to 
request racks.) 
(800) 334-7458 

Customer Service 

(For questions about your sub- 
scription or to place an order or 
change an address.) 
(800) 733-3809 
FAX: (402) 479-2193 

PC Today 

P.O. Box 82545 
Lincoln, NE 68501-5380 


Mon. - Fri.: 8 a.m. to 6 p.m. (CST) 
Online Customer Service 
& Subscription Center 

Authorization For Reprints 

(800) 247-4880 

Copyright 2011 by Sandhills 
Publishing Company. 

PC Today is a registered trade- 
mark of Sandhills Publishing 
Company. All rights reserved. 
Reproduction of material 
appearing in PC Today is strictly 
prohibited without written 
permission. Printed in the U.S.A. 
GST# 123482788RT0001 (ISSN 

PC Today is published monthly 
for $29 per year by Sandhills 
Publishing Company, 131 
West Grand Drive, P.O. Box 
82545, Lincoln, NE 68501-5380. 
Subscriber Services: 
(800) 733-3809. 





I Seagate Ships Easily 
Configurable 3TB 
Desktop Drive 

With 3TB of storage, Seagate's 
new Barracuda XT desk- 
top hard drive offers what 
Seagate calls "the highest 
available capacity for home 
servers and workstations/' 
The key to the Barracuda XT's 
success, however, will likely 
be its included Disc Wizard 
software, which provides a 
workaround for legacy Win- 
dows XP systems and other 
computers that wouldn't oth- 
erwise tolerate a drive with 
a capacity larger than 2.1TB 
without upgrades. The Bar- 
racuda XT is shipping now. 

I VMware Buys Web App 
Development Company 

VMware announced its ac- 
quisition of the San Francisco- 
based software company 
WaveMaker, which makes 
tools that help non-developers 
create Java-based Web apps. 
According to VMware's 
SpringSource Team Blog, 
the acquisition will feed VM- 
ware's overall cloud strategy 
by fostering increased interest 
in Web app development and 
usage. WaveMaker 's software 
is open-source, and VMware 
plans to continue offering its 
software as open-source. 

1 Juniper Announces QFabric 

new business opportunities and 

and Sky Archive will provide 

Data Center Architecture 

makes real-time business pos- 

secure storage. 

By announcing its new QFabric 

sible for the first time," said Jake 

data center architecture, Juniper 

Klein, SAP VP, Data and Analytic 

1 Teradata Buys The Rest Of 

Networks has taken direct aim 

Engines, in a press release. 

Aster Data, Aims For "Big Data" 

at competitor Cisco Systems in a 

Teradata, which provides 

bid to draw customers away with 

1 HP Offers New 

data warehousing, database 

promises of higher performance 

Peace-Of-Mind Services 

software, and analytics for 

and greater ROI. Among other 

HP's new software services, 

enterprise businesses, acquired 

benefits to using QFabric, Juniper 

released under the name HP 

11% ownership of Aster Data, 

is touting the architecture's 

Premier Services, are geared 

a data management and ana- 

ability to permit more visibility, 

toward large businesses that 

lytics company based in San 

provide more security enforce- 

can benefit from assistance 

Carlos, Calif., late last year. 

ment controls, and offer more 

managing HP software and in- 

Now Teradata will acquire 

virtual machines per VMWare 

tegrated third-party software. 

the remaining 89% for $263 

ESX host (five times more than 

"Offerings such as HP Premier 

million. The San Diego-based 

the competition). "With Juniper's 

Services can provide organiza- 

Teradata plans to continue 

approach to securing QFabric," 

tions with the flexibility and 

support for Aster Data cus- 

said Mark Bauhaus, executive 

cost predictability required to 

tomers and transition Aster 

VP and GM, in a statement, "we 

manage and maintain enter- 

Data's employees to Teradata. 

enable the next generation of 

prise software across the entire 

"Teradata is recognized as an 

massive scale and comprehen- 

life cycle — from planning and 

innovator and leader in data 

sive security while at the same 

deployment to support and 

warehousing and the addition 

time reducing the complexity of 

ongoing upgrades," said IDC's 

of Aster Data will enable us 

the data center." 

Elaina Stergiades in a press 

to leapfrog into a leadership 

release. HP Software Premier 

position in the emerging big 

1 SAP & IBM Work Together 

Services are available in four 

data market," said Scott Gnau, 

On Real-Time Analytics 

packages to match companies' 

Teradata chief development 

SAP's new In-Memory Appli- 

varying needs. 

officer, in a press release. 

ance (SAP HANA) software is 

designed to capture data in mem- 

1 Ingres Outlines Cloud 

1 Information Builders Makes 

ory from any source and analyze 

Strategy, Introduces SkySaf e 

Real-Time Mobile BI 

it in real time, essentially yielding 

Ingres, known for its VectorWise 

Perhaps your company is 

database technology for interac- 

eyeing the potential benefits of 


tive reporting and business 

real-time business data analyt- 


intelligence, recently announced 

ics — that is, the ability to view 

a new cloud solutions roadmap. 

where the business is at in 


At the center of Ingres' strategy 

terms of, say, sales or finan- 


is SkySafe, a platform for build- 

cials, at any given moment. 

ing cloud 

Information Builders seeks to 

instant business ™ ^^ 

^ S^^S applica- 

capitalize on that interest with 

intelligence. IBM 

^ ™ ^^ ™ tions for 

its new WebFOCUS Mobile 

^ ■ h ® storing 

BI. Using WebFOCUS Active 
Technology to gather informa- 

software using its 

and work- 

own optimized hardware and 

ing with large amounts of data. 

tion and optimize it in the 

SAP ERP database information 

Ingres says its SkySafe services 

form of small screen-friendly 

to demonstrate how well the 

will be suitable for public or 

charts and graphs, the new 

technology works with IBM's 

private clouds and are customiz- 

product delivers information 

3850 series servers. "By dramati- 

able based on an organization's 

to any mobile device with a 

cally outperforming traditional 

needs. Skylnsight is a related 

Web browser, including An- 

disk-based systems on analytical 

service that will offer interactive 

droid smartphones, the iPhone 

queries, SAP HANA opens 

reporting and analysis, 

or iPad, and BlackBerrys. 

12011 / 



I Alcatel-Lucent Envisions 
An End To Cell Towers 

In touting the benefits of its new 
lightRadio technology, Alcatel- 
Lucent points to the currently 
visible proliferation of cellular 
masts and towers. Designed 
to help wireless carriers save 
energy costs, reduce the carbon 
footprint of their networks, and 
generally reduce total cost of 
ownership, lightRadio technol- 
ogy handles 2G, 3G, LTE, and 
multiple frequencies, the com- 
pany says. Alcatel-Lucent has 
essentially dismantled the cell 
tower concept and distributed 
the components that make up 
a cell tower into small cubes 
that are easier to install and 
manage. Businesses and con- 
sumers will be pleased with the 
technology's ability to expand 
network capacity while remain- 
ing nearly invisible. 

Wi-Fi hotspot. Verizon expects 
to offer nationwide LTE cover- 
age by 2013. 

Marketplace provides access 
to hundreds of applications 
and services. 

I Verizon Releases 
First 4G LTE 

The Thunder- 
Bolt by HTC 
has the distinc- 
tion of being 
the first 4G 
from Verizon 
which in past 
months has 
its 4G LTE 
(Long Term 

networks and now provides LTE 
coverage in 39 markets and 60 
airports. The ThunderBolt runs 
the Android 2.2 OS and features 
a 1GHz Snapdragon processor, 
8GB memory (with support for 
a 32GB microSD card), and the 
ability to create an 8-connection 

I Logitech's LifeSize 
Introduces Mobile Streaming 

LifeSize, a division of input 
peripheral manufacturer Logi- 
tech, announced the addition of 
mobile streaming features to its 
LifeSize Video Center telepres- 
ence solution. LifeSize Video 
Center users, whether remote 
workers or business travelers, 
can now receive live and on- 
demand video in high definition 
on iPads, iPhones, and other mo- 
bile devices via Wi-Fi or cellular 
connection. Additional features 
now available include adaptive 
streaming (to vary the bit rate 
depending on the connection and 
device) and cloud storage. 

I Microsoft Introduces 
Cloud-Based CRM 

Microsoft is taking aim at its 

CRM offer- 
ings with 
its new 
CRM Online 
service, now 
out of beta 
and in full 
release. For 
users accus- 
to Micro- 
soft Office 
products, Dy- 
namics CRM Online provides a 
familiar layout. For IT depart- 
ments, Microsoft says the 
product offers fast and simple 
deployment, whether that 
deployment is cloud- 
based or on-premises. 
The new Microsoft Dynamics 

I Imation Acquires 
Encryption Company 

The Oakdale, Minn.,-based Ima- 
tion, data storage and wireless 
gear manufacturer and owner 
of the Memorex and XtremeMac 
brands, has acquired the Louis- 
ville, Colo.,-based EncryptX for 
an undisclosed sum. (BeCompli- 
ant is the company that does 
business as EncryptX.) EncryptX 
develops encryption software for 
use in USB storage devices, on 
optical media such as DVDs, and 
in PCs. Imation says 10 employ- 
ees will transfer from EncryptX 
to Imation. Imation's recently 
launched Defender Collection 
uses FIPS (Federal Information 
Processing Standard) cryptogra- 
phy for high-level security. 

I Intel Launches Thunderbolt 

Intel's new Thunderbolt tech- 
nology enables high-speed 
connections between devices, 
such as between computers and 
high-definition displays. Thun- 
derbolt operates at lOGBps, 
thereby making short order of 
media and other large-volume 
data transfers between devices, 
including streaming and down- 
loading video and backing 
up to storage devices. Apple 
incorporated Thunderbolt tech- 
nology into its new line of 
MacBook Pro laptop 

I Kaspersky Lab Expands 
Mobile Security Suite 

Russian digital security 
company Kaspersky Lab 
has updated its mobile 
security software to support 
Android and BlackBerry 
devices. The software previ- 
ously supported only Win- 
dows Mobile and Symbian; 
the updated version, Mobile 
Security 9, does not cover 
iOS or Windows Phone 7. In 
addition to threat-blocking 
features, the software also 
aids in theft prevention, the 
recovery or remote control 
of stolen devices, and mo- 
bile content filtering. 

I Google Introduces 
Certification Program For 
Google Apps 

By Google's own count, its 
Google Apps suite is now 
used by more than 3 million 
businesses worldwide. In 
order to help developers, 
authorized resellers, and 
those who service and 
support Google Apps, the 
company introduced the 
Google Apps Certification 
Program. The program is 
designed to give recognition 
and additional credibility to 
those IT professionals and 
resellers who prepare for 
and pass the exam. 

PC Today/ April 2011 5 




I Big Funding For A Simple Concept 

It is becoming a common strategy 
among Internet startups: Give your 
product away for free and wait for 
businesses to start paying for it. 

Online content management 

company recently 

gained $48 million in funding. 

Assuming there's a good concept 
behind the product (in this case, we're 
referring to Web-based services), the 
idea is that individuals will flock to 
the product. If enough of those indi- 
viduals also have a professional in- 
terest in the product, it will become 
popular in the workplace. And once 
it takes hold in the workplace, IT de- 
partments and business owners will 
take note, and many will begin paying 
for bulk licenses. 

This is the path that (www has taken. The Palo Alto, 
Calif.,-based content management 
company offers 5GB of Web-based 
storage free, 25GB for $9.99 per month, 
or 50GB for $19.99 per month to indi- 
viduals. Interested businesses can get 
their feet wet with 500GB of cloud 
storage for $15 per user per month. Be- 
yond that, there are a wealth of enter- 
prise features (including encryption, 
branding, and integra- 
tion) available for custom pricing. 

Boosting's advance in the 
cloud storage market, Meritech Capi- 
tal Partners recently led a $48 million 
funding round that also included An- 
dreessen Horowitz and Emergence 

Backupify caters to individuals and busi- 
nesses that rely on Web-based services and 
want the data stored within them secured. 

Capital Partners. In a blog post, co-founder and CEO Aaron 
Levie said the funding will help the 
company continue to focus on fast, 
reliable service; add support for 
mobile platforms other than the cur- 
rently supported Android and Apple 
iOS; and expand business services 
with synchronization services, enter- 
prise integration, collaboration fea- 
tures, and more. 

I A Different Kind Of Cloud Backup 

As February drew to a close, approxi- 
mately 150,000 Gmail users found their 
accounts had been reset, with a glitch 
having wiped out their email messag- 
es and contact information. By early 
March, Google had restored many 
of the accounts, but heavy users re- 
mained affected for longer (and might 
still be waiting for their data). It's 
this type of situation that Backupify 
( addresses with 
its automated backup service. 

Backupify is different from other 
cloud storage companies in that it of- 
fers a Web service for Web services. 
That is, it's an online service that backs 
up information from Google Apps, 
Facebook, and Zoho accounts, among 
others, via personal, business, and 
enterprise-level accounts. The com- 
pany also snatched up TweetBackup 
in November 2010, clearing out some 
competition and adding Twitter ac- 
count backup to its offerings. 

Backupify, with headquarters in 
Cambridge, Mass., is currently still 
working with the $4.5 million in 
Series A funding it received in 

September 2010 in a round led by 
Avalon Ventures. On the heels of the 
Gmail problem, it's quite possible 
that additional funding for Back- 
upify is just around the corner. 

I Two Security Startups For 
Enterprises To Watch 

There is no shortage of digital se- 
curity companies nowadays, but at 
least two intriguing startups in that 
category are worth noting. 

CipherCloud (www.ciphercloud 
.com), founded in 2010 and located in 
Cupertino, Calif., offers an extra layer 
of security to enterprises using cloud 
services. CipherCloud works by 
encrypting the data (according to 
a company's customizations) that 
flows between users and Web- 
based applications without affecting 
the apps themselves. At this year's 
RSA security conference, Cipher- 
Cloud was named one of the top 10 
most innovative companies. 

The San Francisco-based Okta 
(, founded in 2009 
by execs Todd Mc- 
Kinnon and Frederic Kerrest, offers 
services that help businesses control 
the sign-in process for the Web-based 
apps they use. Whether the apps are in 
the cloud or on the network, Okta's on- 
demand identity management plat- 
form brings them all together and sim- 
plifies sign-on and access. An end user 
can, for example, go to a single sign-on 
home page to access all of the apps the 
company supports. Okta's financial 
backers include Andreessen Horow- 
itz, Floodgate, and Ron Conway. 

12011 / 




I Tablets To Impinge On 
Computer Sales 

Gartner lowered its forecast 
for PC sales in 2011 and 2012 
based on marked growth 
in the tablet market and 
diminished sales of notebook 
computers, which are part of 
the PC category. Gartner ad- 
justed its forecast for PC sales 
to 10.5% growth for 2011 over 

2010 (down from 15.9%) and 
13.6% growth for 2012 over 

2011 (down from 14.8%). 

I Mobile Broadband To 
Reach IB People This Year 

Mobile broadband providers 
should enjoy a banner year 
in 2011. According to ABI 
Research, mobile broadband 
subscriptions worldwide are 
growing in number and will 
reach 1 billion. ABI also re- 
ports that there are currently 
5 billion mobile subscrip- 
tions, with about 20% of 
those categorized as mobile 
broadband. The number of 
mobile subscribers could 
reach 6.6 billion by 2016. 

I 50% Of IT Departments 
Use Open-Source Software 

Although Gartner collected 
the data from 547 IT leaders 
between July and August 
2010, it only recently released 
the results: More than half 
use open-source software as 
part of their companies' IT 
strategies. By comparison, 
five years ago less than 10% 
of respondents reported using 
open-source software. The 
report claims that the use 
of proprietary software has 
declined in rough proportion 
to the increased use of open- 
source software, but adds that 
software is increasingly being 
developed in-house, as well. 

I Who Are B2B Customers & Where Do They Come From? 

Given the soaring popularity of Facebook among consumers 
and, increasingly, in the business world, it probably wouldn't 
surprise you to learn that 37% of customers connecting to B2B 
sites did so using Facebook, but that figure comes from a Gigya 
study from May 2010. According to the latest figures from Gig- 
ya, a company that makes Web sites social networking-friendly, 
Linkedln is taking a bite out of Facebook; in July 2010, 3% of 
customers used Linkedln IDs to log into B2B sites, whereas in 
January 2011, 20% of B2B customers used Linkedln IDs. Below 
are the reported job functions of current Linkedln users. 




^H Marketing 

^H Academics 

^H Engineering 

Public Relations 

— Human Resources 

^H Operation 

^H Finance 



■1 Administrative 

I Android Knocks Apple Out Of Top Spot 

According to the latest Nielsen Company report from the 
smartphone battlefield, Android has nudged its nose in front of 
Apple's iOS for the most popular mobile operating system. An- 
droid users skew slightly younger than iOS users (6% of those 
Android users are between the ages of 18 and 24 compared 
to 4% of iOS users), says Nielsen, but generally age is not a 
significant factor when it comes to choosing an OS. Apple and 
Research In Motion tied for the No. 1 spot among smartphone 
manufacturers. Here are the overall results: 





BlackBerry OS 

iH Other 

Windows Mobile & Windows Phone 7 

I Apple's Mobile 
Browser Is Deemed 
The Fastest 

The results are in from 
Web performance 
company Gomez: 
Apple's mobile brows- 
ers are faster than 
those of Google and 
Research In Motion. In 
a measurement of load 
times, the mobile ver- 
sion of Apple's Safari 
Web browser turned 
in the fastest results 
on the iPad (with an 
average load time of 
8.4 seconds). Safari on 
the iPhone was next 
in line (19.7 seconds), 
Google's Chrome 
browser took third 
place (36.5 seconds), 
and BlackBerry Brows- 
er last (61 seconds). 

PC Today/ April 2011 7 





▲ Cicso Systems forecast.' 

global mobile data trattic 

▲ Carriers are e; 


Drk cc 


n by 



traffic v 

a Wi 



1 solu 




tions, b 



es, and organizations \ 

temtocells, picocells, an 

ther approaches to relieve 











How Businesses Can Address 
Mobile Network Congestion 

laine Flamig 

Take a look around. Odds are good those around 
you are tooling away on a smartphone or tablet. 
Both devices are enjoying immense popularity, 
which is great if you're a manufacturer. For cellular 
carriers, though, the proliferation of iPhones and 
Android devices alone is a source of an intensifying 
headache called "cellular data congestion." Simply 
put, the more smartphones and tablets entering the 

In its Visual 
Networking Index, 
Cisco forecasts 
mobile data traffic 
will increase 26-fold 
from 2010 to 2015. 
(Figures are in exa- 
bytes per month.) 


6.3 EB 

2010 2011 2012 2013 2014 2015 

Source: Cisco Systems "Visual Networking Index," 201 1 

marketplace, the more strain that's being put on 
cellular networks. 

For perspective, consider Cisco Systems' recent 
"Visual Networking Index" report, which calls for 
global mobile data traffic to increase 26-fold between 
2010 and 2015, expanding at a CAGR of 92% to reach 
"6.3 exabytes per month by 2015." Cisco also reports: 

• 3 million tablets connected to mobile networks in 
2010, each consuming five times more mobile data 
traffic (405MB monthly) than the average smart- 
phone (79MB monthly) 

• By 2015, a typical smartphone will generate 1.3GB 
of traffic monthly, a 16 times increase from 2010 

• In 2015, connected tablets will create as much 
traffic (248 petabytes monthly) as "the entire global 
mobile network in 2010" (242 petabytes monthly) 

• By 2015, more than 7.1 billion devices will con- 
nect to mobile networks, roughly equaling the 
world's population 

Given this, it's understandable why carriers are ac- 
tively implementing and experimenting with various 
solutions to offload cellular network traffic, particu- 
larly where high concentrations of smartphone users 
gather and hit the network at once, such as sports 

8 April 2011 / 



stadiums and urban business districts. For relief, 
some carriers are installing and /or leasing Wi-Fi- 
related equipment from BelAir Networks, Cisco, 
Motorola, Ruckus Wireless, and others rather 
than building new, expensive (and unsightly) cell 
towers. Following in carriers' footsteps are busi- 
nesses and organizations with high volumes of 
smartphone and tablet users doing the same. 

The iPhone Phenomenon 

Perhaps the best example of a carrier addressing 
cellular network congestion is AT&T, which cre- 
ated a "Wi-Fi Hotzone," or widespread Wi-Fi 
hotspot, in Times Square to ease mobile traffic, 
which jumped rapidly after adding the iPhone to 
its network. William Ho, Current Analysis VP of 
consumer services, says AT&T became "the poster 
child" in this area due to the iPhone's "ease of use" 
translating into users drawing more bandwidth, 
something AT&T didn't anticipate. 

"They took PR hits for that," Ho says. 
"Because of the lessons they learned all the other 
carriers have followed suit to beef up their back- 
haul specifically and the network to offset any 
negative PR. I think everyone is doing a good job 
of beefing up the backhaul, which is really the 
possible bottleneck, as well as cell sites and tech- 
nology to increase downlink capability." 

Beyond Wi-Fi-based solutions, carriers (in- 
cluding T-Mobile) are turning to femtocells to 
boost 3G performance where signal strength is 
poor or lacking. Picocells, meanwhile, are turning 
up in shopping malls, transportation stations, 
and office buildings to extend and add cellular 
coverage. Distributed antennas are more expen- 
sive, says Aditya Kaul, ABI Research analyst, 
but serve a purpose in sprawling spaces such 
as airports, stadiums, and corporate campuses 
measuring 100,000 to 200,000 square feet or more. 

Kaul says femtocells have matured in recent 
years and are "definitely a solution that's gaining 
a lot of interest from the operator community. 
We're seeing a lot of trials going on at the mo- 
ment" as opposed to years past when operators 
were hesitant to roll them out due to uncertain- 
ties in how they'd behave on the network. "Over 
the last few years, a lot of doubts have been taken 
care of," Kaul says, and consumer deployment 
"will transition to the enterprise in 2011." 

In The Workplace 

Two organization types increasingly dealing 
with network congestion are hospitals and univer- 
sities. In hospitals, system integrators have seen 
huge "growth in the number of iPhones owned 

by doctors" adding traffic to hospital networks 
already being tapped by users trying to access 
electronic records in a timely manner, Kaul says. 
At universities, large numbers of student-owned 
devices coupled with schools distributing net- 
books, smartphones, and other devices to students 
are contributing to congestion, Kaul says. 

Similarly, congestion is cropping up in en- 
terprises where IT departments distribute iPads 
and smartphones to employees, Kaul says. Aging 
network infrastructures aren't helping matters. 
"An IT manager of a Fortune 500 company was 
telling me the infrastructure that's in place on his 
corporate campus is actually 10 years old," Kaul 
says. "The kind of traffic they're seeing now, the 
infrastructure is just not able to deal with that 
amount of traffic. So the IT manager . . . went out 
and bought some femtocells and picocells out of 
his own money to put them on [the network] just 
to deal with the problem; it's about that bad in 
some cases." From a corporate office perspective, 
network congestion hits "across all types of offices 
and all types of businesses," Kaul says. 

The Best Relief 

The best approach for businesses seeking to 
alleviate network congestion is subjective, Kaul 
says, as "different situations need different solu- 
tions." Expanding "Wi-Fi access points is a costly 
proposition for a lot of businesses," Kaul adds, but 
for those with infrastructure already in place, tech- 
nologies such as Kineto's Smart Wi-Fi application, 
which Kineto claims is loaded on more than 1 mil- 
lion Android devices, is good for enabling a device 
to automatically switch from 3G to Wi-Fi upon en- 
tering the building, Kaul says. "From an operating 
system perspective, from an Android perspective, 
from an iPhone perspective, I think that will be- 
come much more seamless as you go along," Kaul 
says. "It will become much more intelligent. The 
phone will be able to switch to Wi-Fi or 3G based 
on what's the most ideal connection." 

Ho says, "It's understood that within your 
own confines, if you've boosted your Wi-Fi net- 
work it should alleviate all the congestion and 
not really go out toward the cellular, which is a 
slower user experience for all the employees." 
Outside those confines, he says, it's an "under- 
appreciated fact that Wi-Fi is on certain carriers 
within their smartphones and built into mobile 
broadband plans with other carriers. For ex- 
ample, AT&T does a very good job in having a 
very large pool of Wi-Fi hotspot assets. As part 
of your data plan you get access to all those Wi-Fi 
areas in a seamless manner." ▲ 


From a corporate office 
perspective, network 

of businesses," says Aditya 
Kaul, ABI Research analyst. 

Stf** 1 * 

PC Today/ April 2011 9 



Keep It Clear 

How Seven Vendors Help Improve Your Wireless Experience 

by William Van Winkle 





|||||||| ( 




The more people rely on cellular and 802.11- 
based communications, the more risk there 
is of each user's wireless performance being 
impacted in a high-traffic area. Fortunately, these 
seven companies have tailored key products to 
help mitigate congestion and make sure that every 
user has a rewarding experience. 

Aruba Networks 

A major focus for Aruba's wireless strategy is 
its Adaptive Radio Management implementation, 
found in many of its AP (access point) and con- 
troller products. ARM addresses several key areas, 
such as airtime fairness ("fair" distribution to cli- 
ents of wireless network resources), optimizing 
traffic according to client type, maximizing 802.1 In 
performance when 802.11b/g legacy clients are 
present, dynamic shifting of clients into optimal 
radio spectrums, and co-channel interference man- 
agement. Overall, Aruba notes that ARM should 
double the average throughput for dual-band cli- 
ents, plus it helps assure enterprise-grade VoIP 
quality even with 100Mbps of traffic on an AP. 

For small businesses, the Aruba AP-92/93 and 
AP-105 showcase ARM for a fairly low entry price. 
All have 2x2 dual-band MIMO antenna configura- 
tions, and the AP-92 features external antennas. The 
AP-92 and AP-93 use single radios while the 105 
sports two radios. With these APs, the best way to 
leverage ARM is through one of Aruba's 600-series 
controllers. Check out Aruba's ARM literature and 
you'll find the side-by-side pie charts showing how 
under normal conditions, some clients in crowded 
environments get almost no bandwidth while others 
get vastly skewed amounts. With ARM, the band- 
width distribution markedly evens out. 

BelAir Networks 

BelAir Networks targets wireless carriers with 
a wide range of products aimed primarily at wire- 
less carriers. One of these product segments targets 
3G/4G data offload, allowing more cellular traffic 
to flow within high-use areas by shifting data com- 
munications from the cellular network onto Wi-Fi 
connections. Instead of adding more towers, carriers 

add "picocells" at the street level. In fact, some pico- 
cells can provide both cellular and Wi-Fi connectivity 
from the same device. BelAir's Web-based manage- 
ment system, called BelView, can scale to handle 
50,000 such base stations within one network, and it 
runs on commercial server equipment. BelAir notes a 
coverage area of 2 square kilometers per picocell and 
recommends 30 to 40 cells per square kilometer. 

BelAir Networks' comprehensive product and ser- 
vice portfolio spans from the modest, dual-radio BelAir 
20 AP to the BelAir 200D, a four-radio multi-service 
switch router meant for defense applications. These 
generally are not off-the-shelf SKUs, so BelAir provides 
ample planning, deployment, and support services for 
environments ranging from city hotzones and perfor- 
mance venues to special events and retail chains. 

Cisco Systems 

In the Wi-Fi world, congestion is simply another 
term for competing traffic. There are only a relative 
handful of non-overlapping RF (radio frequency) 
channels available to APs and client devices. The best 
channel for any given device is generally the one with 
the least amount of ambient signal competition, but 
discovering and profiling just how much RF activity 
exists in a given channel has historically required a lot 
of time and costly equipment. Cisco's CleanAir tech- 
nology, embedded in several of its AP and WLAN 
controller families, performs this analysis on the fly. 
CleanAir detects a host of RF interference sources, 
examines how they could impact Wi-Fi performance, 
can visually plot this interference on a floor plan of 
the business, and dynamically self-optimizes the net- 
work by changing device channels as needed. 

The downside of CleanAir is that it's not back- 
ward-compatible with existing AP infrastructure. 
The good news is that Cisco has plenty of device 
options throughout its Aironet 1550 outdoor AP and 
Aironet 3500 indoor AP families. Cisco's Wireless 
Control System software ties all CleanAir products 
together and makes managing them straightforward. 

Juniper Networks 

Juniper often discusses cellular congestion along 
with 3G-to-4G migration in the same breath, and 

10 April 2011 / 



if you're a wireless carrier, it's important to keep 
both issues in mind. As overall traffic volume ex- 
plodes, it's important not only to increase speeds 
but also preserve quality of service. Juniper ad- 
dresses this need with its MX 3D Series Universal 
Edge Ethernet routers and Junos software platform. 
The MX family starts with the MX80, a 2U height 
model with 80Gbps of system capacity. At the top 
end, the MX960 is a 16U powerhouse with 2.6Tbps 
capacity and 120Gbps per slot. 

The key ingredient in Juniper's offloading is its 
Traffic Direct functionality. In Juniper's words, this 
"optimizes mobile data traffic by combining intel- 
ligent subscriber and application policies with MX 
3D Series scaling to offload bulk data traffic directly 
to the Internet." Additionally, Juniper's Junos plat- 
form uses software from the company's Ankeena 
Networks acquisition to optimize live and on-de- 
mand video streaming to mobile screens. This is done 
by analyzing available bandwidth to the client and 
adapting download streams to those conditions. 

Motorola Solutions 

Motorola Solutions offers a wide range of voice 
network optimization products, but an interesting 
twist on the usual cellular offload lineup arrives 
in the form of Motorola's TEAM VoWLAN (Voice 
over WLAN) smartphones. These are ruggedized 
handsets that run Windows Mobile 6.5 (hope- 
fully, Windows Phone 7 models will follow soon) 
and transmit in 802.1 la/b/g and Bluetooth. The 
EWP2000/3000 series phones are not cellular; rather, 
they run enterprise-grade VoIP to a single handset 
and leverage PBX telephony to eliminate the need 
for conventional desk phones or workplace cell 
phones. The handsets provide push-to-talk function- 
ality, text messaging, Web browsing, and other tools 
for keeping employees communicating on the go 
without running afoul of cellular network conges- 
tion. Of course, Motorola also offers a wide range 
of mesh WAN, WLAN, and network management 
products for handling dense wireless environments. 

Interestingly, Motorola sold off its wireless net- 
working business last summer to Nokia Siemens 
Networks. By the middle of this year, NSN expects 
to release its Smart WLAN Connectivity Solution, 
which will automatically transition mobile client 
connections from cellular to Wi-Fi without any 
manual intervention on the user's part. 

Ruckus Wireless 

To help mobile operators deal with the wall of 
data traffic hitting their cellular networks, Ruckus 

Wireless combines its patented Wi-Fi technology 
with a Wireless Services Gateway system. Ruckus 
handles Wi-Fi instability by applying advanced 
beamforming techniques through adaptive antenna 
array technology to control the form and direction 
of Wi-Fi transmissions. Each Ruckus AP integrates 
a miniaturized antenna array that constantly selects 
the best performing signal path for any packet 
destined to a given client. The technology also re- 
jects interference by not processing the noise that 
often overpowers conventional APs. In essence, 
whereas Cisco changes channels to avoid interfer- 
ence, Ruckus isolates the exact path between AP 
and client and ignores all other traffic. This gives 
cellular operators the ability to fill in coverage holes 
with more reliable Wi-Fi. 

Ruckus has added a new Mobile Wi-Fi gateway 
device it calls the Ruckus WSG. This device func- 
tions as a massively scalable wireless LAN con- 
troller but adds access gateway capabilities that 
interface with existing cellular core services, such 
as authentication, policy enforcement, billing, and 
provisioning. From the edge of the radio access 
network, the WSG aggregates all Wi-Fi traffic and 
presents it to the cellular core, where it looks like 
any other cellular data traffic and allows operators 
to manage Wi-Fi traffic more easily. 


Xirrus offers a complete line of enterprise-class 
Wi-Fi APs featuring up to 16 radios and 60 an- 
tennas per AP. These focus into a 3x3 MIMO pat- 
tern for specified throughput of up to 300Mbps per 
radio. Xirrus promises up to twice the range and 
four times the coverage area of a typical AP. While 
Xirrus' circular AP design is reminiscent of Ruckus' 
beamforming approach (although the radio signal 
processing methods are different), much of Xirrus' 
benefit lies in its Management System's load bal- 
ancing algorithms. By monitoring the real-time 
conditions of all radios in an array, Xirrus helps 
to dissuade clients from automatically connecting 
with the strongest signal. 

If you imagine 100 clients in a room with one AP 
over the crowd and two APs in adjacent rooms, the 
first AP will have the strongest signal and thus be a 
magnet for most of the traffic regardless of conges- 
tion and bandwidth conditions. Xirrus "coaxes" con- 
nections between clients and APs with weaker signal 
strength. The lower raw bandwidth is offset by the 
lack of congestion, resulting in higher throughput 
for everyone on the WLAN. Xirrus AP models span 
from the four-radio XN4 to the 16-radio XN16, 
which can support 1,536 users per array. ▲ 






PC Today/ April 2011 11 



Seamless Access 


Juniper Networks' Solutions For The Wireless Data Drain 

by Rod Scher 

The wireless data load is doubling every year, and 
companies are looking for ways to deal with that 
increase so that their employees or customers don't 
find themselves without connectivity. We spoke with 
Kittur Nagesh, senior director, Mobility & Security 
Solutions Marketing for Juniper Networks, to get his 
take on the issues and how they might be addressed. 




What are the main connectivity issues with 
which SMBs are dealing these days? 

Voice, SMS, and data connectivity were the foun- 
dations for mobile operators, but in the last few 
years, data has taken off 
exponentially, and in the 
coming years that will con- 
tinue unabated — so much so 
that "Internet" will become 
increasingly synonymous 

with "mobile Internet." 

QWhat does that mean for the operators, then, 
who may or may not be SMBs themselves? 

A Operators need to make sure that they not only 
manage the data deluge, but also deliver on the 
promise of ubiquity and experience for their con- 
sumers: first, to keep them and reduce the churn; 
second, to deliver a compelling experience so that 
they can command premium pricing; and third, from 
an SMB's standpoint, so that they can offer "sticky" 
business services, which are usually more profitable. 
This is true for both wireline and mobile, although the 
challenges are more profound on the mobile side. 

QSo, what does Juniper offer to help SMBs 
meet these needs you've mentioned? 

A Juniper has been a leader in IP networking for 
almost 15 years; we started out with routers, 
and now we have a portfolio that includes routers, 
switching, data center solutions, security solutions, 
and also wireless solutions. 

These products, technologies, and services are all 
packaged for both SMBs and others, along with pro- 
fessional services and partner capabilities. We believe 

that SMBs will also be innovators — both from an ap- 
plication standpoint and in terms of how they harness 
the network — so the switching, the routing, the secu- 
rity, and the rest of Juniper Networks' portfolio will 
enable them to innovate new business applications to 
drive productivity and use the network as a competi- 
tive differentiator to run their businesses. 

Smartphones and iPads are becoming compute 
devices, so we're extending capabilities and also 
providing business-level VPN and SSL security 
services so that there is ubiquity and so SMBs don't 
necessarily have to think about the network, but can 
instead focus on what they're doing with it; we'll 
handle all the seamlessness that is required for these 
types of applications. We've also considered this no- 
tion of unifying the wireless and wireline parameter 
for these networks by thinking through the integra- 
tion of the switching portfolio with our wireless 
portfolio, which allows us to create a unified param- 
eter, regardless of whether it's wireline or wireless, 
in an almost access-agnostic manner. 


How does the "offload" issue fit in here? 

A The portfolio integration helps lay the foun- 
dation for intelligent offloads. For example, 
if you're doing something on the cellular side, 
you can walk into your home office and intel- 
ligently offload to wireless. People don't think, 
"I'm on cellular, I'm on wireless LAN, I'm on 
a wired connection." Instead, we're reaching a 
stage where the user requires ubiquitous, seam- 
less access. I think that is what SMBs expect, and 
they're entitled to it, because IT should be an 
asset and not a headache. 

Of course, there are different points in the net- 
work where offloads are possible. Juniper has a 
three-pronged approach to the offload: at the Wi-Fi, 
at the control plane, and before the mobile network 
branches off onto the Internet — because we can 
identify that the packet is going to or coming from 
the Internet. So there are three intelligent aspects to 
the offload; it's not just "offload equals Wi-Fi." ▲ 


Businesses that are serious about productivity, 
working smarter and adding to their bottom line are 
turningto Best Buy For Business. Online, on the phone, 
at your local Best Buy store, or even at your site, you' 
find trained and tested associates ready to dig in. 


Commercial-grade products, services, and installation 
Bulk ordering of products and gift card incentives 

> Flexible payment options like net-30 financing 
and purchase orders 

Government, education and tax-exempt accounts 

Complex logistics including multi-location delivery 

> Pre-sales engineering and onsite consultations 



▲ The question of cloud 
growth is about what's 
mature and what's as yet 
immature, not about what 
is hype and what isn't. 

▲ Cloud is disruptive not 
because of technology, 
but because of business 

▲ Private clouds and SaaS 
offerings make up the big- 
gest chunk of mature cloud 

▲ There are several barri- 
ers to cloud adoption, but 
much of those issues can 
be solved by strong SLAs 
(service-level agreements) 
and partner ecosystems. 

Beyond The 

"Cloud Hype" Concept 

The Promises & Limitations Of Cloud Computing 

by Seth Colaner 

It has been a few years since cloud computing 
emerged, and opinions still differ about how 
much of what cloud computing promised has 
come to fruition and how much has turned out to 
be little more than hype. 

But that's a misleading dichotomy, because any 
argument about cloud computing being empty 

buzzwords and broken dreams assumes that the 
technologies and service models that make up the 
cloud are both fully mature and have proven fruit- 
less. Neither is true. 

Instead, a better way to evaluate cloud computing 
today is to examine what is mature and what is yet im- 
mature. As Holger Kisker, senior analyst with Forrester 

14 April 2011 / 



Research (, noted, "It's not 
so much about which markets are successful and 
which ones are hype, it's more [about] at what 
point of their maturity life cycle are different cloud 
market opportunities at this point in time." 


"'Cloud' is a hodgepodge of technologies 
that received an awful lot of hype," says Dennis 
Drogseth, vice president of research with EMA 
( He notes 
that in the tech world, people think that "every- 
thing that's two years old is ancient and mature. 
In reality, a lot of trends are just the opposite. 
Cloud has probably got at least five to 10 years 
before it really matures and is really assimilated." 

It's also important to note that cloud com- 
puting is not one "thing"; it's a diverse, complex 
set of technologies and services, each of which 
offers different advantages and drawbacks. And 
because cloud is by nature service-oriented, the 
possibilities afforded by any particular innova- 
tion are deeply affected by individual providers. 

Because cloud computing is so large and 
nuanced, it's hard to answer broad questions 
about it, and it's notoriously difficult to define 
cloud computing succinctly. Therefore, when dis- 
cussing the state of cloud computing, it's crucial 
for all parties to be talking about the same things. 

Too often, talking about cloud computing 
can be like the story of the old blind men trying 
to describe an elephant. Depending on which 
part of the elephant each man is able to touch, 
the definition changes. One feels the trunk and 
declares "An elephant is like a great serpent"; 
another runs his hand over the animal's leg and 
asserts, "No, an elephant is like a tree"; still an- 
other feels the elephant's ears and counters that 
"An elephant is like a giant leaf"; and so on. The 
conversation quickly becomes unhelpful unless 
those involved can see the big picture as opposed 
to their own small corner of it. 

One (rather large) wrinkle in evaluating cloud 
maturity is that innovators in the field aren't 
necessarily developing new technologies per se; 
instead, they're really coming up with new ways 
to leverage existing (mostly long-existing) tech- 
nology to come up with an offering that works 
for a particular business model. 

Dr. Stefan Reid, a principal analyst with 
Forrester Research, noted "The major 'disrup- 
tion,' if you will, is the business model itself." 
He pointed out that virtualization software such 
as VMware has been around for many years; it 
became more successful, however, when those 

providers figured out pricing and service models 
that were compelling to customers. 

What's Working Now 

What constitutes "maturity," then? Reid puts 
it succinctly by noting that a particular offering 
can be considered mature if it's complete, if "you 
have many components that help you create 
business logic." 

One of the areas that fits Reid's definition of 
mature is the private cloud. As Kisker points out, 
"From the private cloud side, all the technologies 
for virtualization are very mature already." Thus, 
companies can use that technology and those IT 
resources to develop business processes that con- 
tribute to their overall success. 

This makes a great deal of sense if you think 
of cloud computing as an evolution rather than 
a revolution. A revolution is overthrowing 
what exists and replacing it with something 
entirely new. But in a private cloud, a company 
isn't chucking its entire infrastructure into the 
dumpster and starting from scratch; instead, 
the company is trying to maximize its existing 
infrastructure, middleware, and applications 
and finds that by virtualizing its resources and 
distributing them on an as-needed basis, the 
data center becomes an area of profitability. 

Drogseth says, "Internalizing the cloud and 
virtualizing data centers has been a huge suc- 
cess overall," and he pointed out that one of the 
biggest advantages of a private cloud is that IT 
personnel can manage a company's IT needs 
without experiencing any downtime. 

Of course, the private cloud isn't the only area 
of cloud success. In Forrester Research's estima- 
tion, the cloud computing market is currently 
worth about $38.4 billion. Of that, SaaS (soft- 
ware-as-a-service) applications make up about 
$18.88 billion— more than half of the total cloud 
market. Kisker notes specifically that SaaS ap- 
plications such as CRM, human capital manage- 
ment, and procurement are currently enjoying 
substantial growth. 

A Look Ahead 

According to Forrester's taxonomy of cloud 
computing, there are 12 distinct cloud markets, 
including the familiar SaaS, PaaS (platform as a 
service), and IaaS (infrastructure as a service); the 
emerging BPaaS (business process as a service); 
and a number of categories that make up private 
clouds and virtual private clouds, such as vir- 
tualization tools for infrastructure, middleware, 
applications, and business processes. 

From the private cloud 
side, all the technologies for 
virtualization are very mature 
already," says Holger Kisker, 
senior analyst with Forrester 

Dr. Stefan Reid, a principal 
analyst with Forrester 
Research, notes, "The major 
'disruption,' if you will, is th< 
business model itself." 

Dennis Drogseth, EMA vice 
president of research, says, 
"Internalizing cloud and 
virtualizing data centers has 
been a huge success overall." 

PC Today/ April 2011 15 



Essentially all of these markets are growing to 
some degree, and Forrester predicts that growth 
will continue its upward trend for years to come. 
Says Kisker, "Each of these markets now have 
their own dynamics — how they are growing, 
their own level of success at this point in time, 
and maturity/' 

Taken as a whole, Forrester estimates that the 
cloud computing market will be worth about $150 
billion by 2020. Future growth areas include ERP 
(enterprise resource planning) and the relatively 
new BPaaS offerings. 


As with any disruptive technology (or in this 
case, as previously mentioned, disruptive business 
model), cloud computing has its share of barriers to 
adoption, and they shouldn't be taken lightly. 

Security is one of the most often-cited con- 
cerns. Indeed, until more stringent security mea- 
sures are in place, it's not an especially attractive 
option for every business to move its most sensi- 
tive data or applications to any type of cloud — 
private, public, or hybrid. Part of the security 
issue falls to legislators, who can make it easier 

Sizing The Cloud - Quantifying And Predicting The Future Of Cloud Computing 

Million USS 

market size 

Source: Forrester Research 

According to Forrester 
Research, the cloud 
computing market will 
continue to grow for many 
years to come. 

or more difficult to enact security standards 
across countries or regions. 

Another big issue is fragmentation: There are 
very few (if any) cloud service providers offering 
comprehensive services all the way up the stack 
from infrastructure to applications. Instead, a busi- 
ness may find itself working with an application 
provider that relies on another company's cloud 
platform that in turn relies on another company's 

cloud infrastructure. At a certain point, who's re- 
sponsible? If you experience a service disruption, it 
can be difficult to determine where in the stack the 
outage occurred if you only have visibility into the 
SaaS provider. 

Additionally, cloud is by nature service-ori- 
ented, so all of the issues inherent in working 
with a service provider of any kind apply to 
the cloud. As with any service a business pays 
for — telephony, electricity, and so on — a cloud 
offering must offer consistency in the quality of 
the service as well as the promise of essentially 
no downtime. Any cloud provider that doesn't 
offer a strong, comprehensive SLA (service-level 
agreement) isn't one worth doing business with. 
How long would you stick with a phone service 
provider or power company that experienced 
outages every couple of weeks, severely dis- 
rupting your business? 

The same goes for any cloud provider dealing 
with sensitive data or business-critical applications. 
If service is spotty or has an unacceptable level of 
downtime, it deeply affects your business. 

But there is a way forward, and the "winners" in 
the cloud market — those that find maturity fastest — 
will likely be those that create the best partner ecosys- 
tems. "If you have an application plus a platform, you 
invite partners to add logic on the platform and com- 
bine to the application, and you are more mature," 
says Reid. "From the other angle, you have these 
infrastructure vendors that are moving up and want 
to be part of the platform." 

This is in many ways what has happened in 
other tech sectors, such as personal computing 
and mobile technology. Software, hardware, and 
operating system makers (also, increasingly, mobile 
service providers) work together as partners to 
produce compelling products for the consumer. In 
very few instances does a single company offer ev- 
erything from the bottom up; the Microsofts need 
the Dells, who need any number of software ven- 
dors, who all need the Verizons and AT&Ts. 

Education for all involved parties is at the core 
of cloud growth going forward. Kisker puts it suc- 
cinctly: "The vendors need to understand clearly 
if what they have is really a cloud offering and 
where their offering fits. And then the users need 
to understand what are the benefits of the different 
cloud offerings and understand which technology 
you want to apply, whether it's in their enterprise, 
whether it's a public service, or for what resource." 

Thus, although there are certainly barriers to 
cloud adoption, progress has been steady and 
shows no signs of abating. ▲ 

16 April 2011 / 



^- A Rocky - 



Infrastructure In The Cloud Seeks To Overcome Challenges 

by Christian Perry 

As the cloud continues its storied ascent to 
the upper reaches of technology innovation, 
separation among various cloud iterations is 
becoming more apparent. Within that movement 
is evidence of a growing hesitancy around IaaS 
(infrastructure as a service) as large enterprises and 
small businesses alike appear more likely to lend 
enthusiasm — and investments — to cloud-based 
software services. Is IaaS destined to mire away on 
the cloud sidelines, or can the services prove them- 
selves as lasting, easily approachable solutions for 
IT to offload in-house operations? 

"IaaS is still in its infancy and today requires 
more integration work than many customers can 
tolerate if they truly want to make it an extension 
of their IT infrastructure and capabilities," says 
Jeff Boles, senior analyst and director of valida- 
tion services with Taneja Group (www.taneja "With that level of integration, IaaS 
is certainly worthwhile and can disruptively alter 
the economics and flexibility of IT. But getting 
that level of integration is difficult for most, if not 
all, organizations, as it many times requires not 
only incorporation of cloud technology but deep 
alterations in existing IT practices and systems 
so that they work alongside cloud offerings that 
are many times more restrictive than traditional 
IT systems." 

Funneling an entire IT operation into cloud 
services is certainly a bold, complicated ven- 
ture, but even trusting a portion of operations to 
IaaS demands close inspection of service details 
to ensure the service parallels or exceeds what 
a business already receives in-house. Despite 

the efforts involved with transitioning to IaaS, 
analysts nonetheless see promise in the space and 
expect that it will enjoy growth once it passes the 
current early adopter phase. 

Bridging The Gap 

Businesses that lack IT infrastructure expertise 
have a small handful of choices today: hire the 
necessary personnel to handle the infrastruc- 
ture implementation, locally outsource experts 
to handle it, or trust the duties to an IaaS pro- 
vider. Warren Arbogast, founder and president 
of Boulder Management Group (www.boulder, acknowledges the dif- 
ficulties involved with IaaS but says the concept 
only makes sense for businesses without core 
expertise in IT infrastructure and want new ways 
to keep costs down. IaaS does continue to deal 
with stumbling blocks in terms of familiarity 
among potential customers, but its potential is 

"There's still a lot of confusion out there as to 
what IaaS is, what it can do, how it really works, 
and how it's different from PaaS [platform as 
a service] and SaaS [software as a service]. But 
there's also a growing energy out there. I'm 
seeing it at the C-level like never before. People 
are questioning, 'Why are we doing these things 
in-house when I can do all of this with my iPad 
and smartphone?' Of course it's a lot more tech- 
nically complex than turning things over to iPads 
and IaaS providers, but I'm seeing a push to out- 
source all these bulky, cumbersome, confusing 
tech things like never before," Arbogast says. 

PC Today/ April 2011 17 




Unlike SaaS, which can be more forgiving 
as a business makes a gradual transition from 
one application to another, the somewhat cut- 
and-dried approach to IaaS can force adopters 
to endure striking changes as they become ac- 
customed to infrastructure changes. 

According to Boles, IaaS innovation needs 
to occur within the gap between existing in- 
frastructure and IaaS offerings, which he says 
have been built on the "other side of a chasm." 
However, bridge builders are coming, and the 
eventual bridge could change the way business 
is done. In fact, he sees products that bridge 
this gap as possibly the most valuable IaaS 
vendor products in the future, particularly for 
enterprises looking to integrate the cloud into 
their operations. 

"Simultaneously, what we are seeing now 
is a shift toward more major IT investments 
happening on the other side of the bridge, and 
this will only happen more often in the future," 
Boles adds. "The IaaS may be a big and signifi- 
cant customer for many vendors in the future. 
This will alter the way technology is acquired 
and used and change the nature of the IT cus- 
tomer relationship. Storage and data are two 
areas of the infrastructure that could be most 
significantly disrupted here — the cloud stands 
to change the way data is integrated and inter- 
acted with, and innovative vendors could use 
this to entirely shake up how storage technolo- 
gies are consumed." 

As the evolution of the IaaS space continues, 
loads of vendors have entered the picture, in- 
cluding Amazon, GoGrid, Rackspace, Savvis, 
Terremark, Verizon Business, and others. 
Although an outsider might view this vendor 
selection as relatively crowded compared to de- 
mand, Boles points out that there's more room 
for variety in IaaS than in any other type of 
product market. Yet despite that room, he says 
that vendors have failed to develop sufficient dif- 
ferentiation to sustain their numbers — too many 
similar services are available that are difficult to 
tell apart. He estimates that the next two to three 
years will see the rise of certain IaaS providers 
that determine how to better differentiate target 

customers, custom solutions, partners, pricing, 
track record, integrity, and other factors. 

"Enterprise consumers of cloud services will 
begin to dip their toe in the water by moving 
non-mission-critical applications to the cloud to 
evaluate factors such as downtime, CAPEX, and 
OPEX savings, difficulty or ease of transitioning 
to the cloud environment, security, etc.," says 
Ron Angner, a senior vice president with TMNG 
( "We believe that adoption at 
the enterprise level, where the true benefits will 
be, may be a little bit slower than anticipated, but 
over the next 18 months, cloud services will be 
verified, and the 'trust' factor will grow, leading 
to further adoption." 

We're Just Fine 

From a vendor perspective, IaaS represents 
a huge opportunity both for the vendor's busi- 
ness and for the business of prospective cus- 
tomers. With today's IT landscape built partly 
by highly flexible technologies designed to ac- 
commodate the varied needs of organizations, 
IaaS stands to fill a gap that other cloud-based 
technologies cannot. According to Matthew 
Leonard, senior product manager for IaaS at Tata 
Communications (www.tatacommunications 
.com), IaaS may not appear sexy to those outside 
of the IT industry, but it has big benefits to those 
who live within it. 

"There is a school of thought that over time, 
all IT services will be delivered via software as 
a service, and there will be no need for IaaS. But 
I don't see this happening, at least over the next 
10-year horizon. This could happen within small 
business segments where SaaS has been aggres- 
sively used. However, medium and large busi- 
ness enterprises will want the freedom to take 
different software components and glue them to- 
gether with different OS capabilities themselves," 
Leonard says. 

Vendors are quick to clarify the terminology 
around IaaS, which can grow convoluted among 
the many options available on the market. For 
example, IaaS isn't just about external public 
clouds, but also internal private clouds offered to 
business units by IT departments, explains Dave 

18 April 2011 / www.pctoday, 



Roberts, vice president of strategy and marketing 
at ServiceMesh ( Inside 
most enterprises, these business units — as well as 
application developers — request computational 
capacity from the IT department as infrastructure 
(e.g., "I need another server"). The IaaS model, 
Roberts says, packages this same product and of- 
fers it as a service. 

In fact, private clouds could be a significant 
area of growth for IaaS in the near future. "A lot 
of our larger customers want to take advantage 
of IaaS but have concerns about security and per- 
formance in a multitenant environment, so they 
are asking us how we can integrate a private IaaS 
service into their existing model," notes Thomas 
Kiblin, chief technology officer and founder of 
Virtacore Systems ( "I also 
think you'll start to see a more focused model on 
certain niche plays as IaaS providers try to carve 
out their share of the market. You can't beat 
Amazon trying to be Amazon; you have to find a 
niche, focus, and execute on it." 

A decade ago, Kiblin says, oversaturation 
rhetoric plagued the hosting market, but today 
there are more hosting vendors and MSPs 
(managed service providers) than there were 
then. As for IaaS, demand appears abundant 
when he engages prospects and partners, 
adding that C-level executives consistently 
place cloud initiatives at the top of their pri- 
ority lists for the next 12 to 24 months. Yet, like 
analysts, vendors recognize the need for differ- 
entiation in the market to ensure their survival. 

"What will be important is innovative IaaS 
features and capabilities beyond simply spinning 
up those resources," Leonard says. "Companies 
who simply offer baseline IaaS service without 
any differentiation will be forced out of the 
market. There will always be room for new en- 
trants in the market with differentiated capa- 
bilities. Footprint and pod location is also a major 
consideration in the competitiveness of the IaaS 
provider and the demand for service." 

For its part, Tata Communications worked 
to differentiate its IaaS offering by delivering 
seamless integration with its MPLS (multipro- 
tocol label switching) network to provide a 

private on-ramp to the IaaS cloud. Security is a 
top concern among businesses transitioning to 
IaaS, and Tata worked to deliver a path to the 
space that doesn't require businesses to touch 
the public Internet. As with any technology, 
such innovation could work to thin the vendor 
herd as customers choose solutions that fit well 
with their environments. 

"The relative oversupply of capacity at the 
current moment is merely a sign that many 
players are competing for the business and is 
not indicative of a lack of consumption," Roberts 
says. "Indeed, market leaders are experiencing 
double-digit growth in their IaaS revenue at the 
current time. This is poised to continue as enter- 
prise IT departments move from pilot and proof- 
of-concept deployments into full production." 

Down The Road 

Simplicity remains a valuable commodity 
for IT vendors looking to sell complex concepts 
to businesses that aren't necessarily familiar 
with cutting-edge technologies. In turn, the 
innovation inherent in IaaS stands to shine 
through simpler, easy-to-digest offerings 
aimed at specific needs. Scott Archibald, man- 
aging director and IT transformation practice 
leader at Bender Consulting (www.bendercon 
.com), expects to see vendors eventually re- 
lease "IaaS in-a-box" solutions, such as an IaaS 
trade show product that would target software 
vendors demonstrating at trade shows who 
don't want to bother with complicated server/ 
infrastructure setups. 

"I think the IaaS market needs to do a better 
job of selling the niche areas in which [IaaS ven- 
dors] can be useful," Archibald says. "In addi- 
tion, IT organizations need to keep looking at 
the technology and ROI that IaaS vendors can 
offer. Right now, too many are looking at the 
technology and feel they can do what IaaS ven- 
dors are offering. However, these same IT orga- 
nizations are not asking the question of whether 
they should be doing this. IT organizations need 
to continuously look at what services and skills 
they should be developing in house versus what 
they should be getting externally." A 

"Many businesses are 
looking at IaaS for 
software development 
and dynamic Internet- 
facing applications," says 
Matthew Leonard, senior 
product manager for IaaS 
at Tata Communications. 
"In fact, many ClOs would 
question buying dedicated 
IT resources for these 

crowded anc 

state, we would expect 
that it will thin substan- 
tially over the coming 

market picks the winners 
and losers from among 
the available offerings," 
says Dave Roberts, vice 
president of strategy and 
marketing at ServiceMesh 

PC Today/ April 2011 19 




The Rise Of Real-time 
Analytics Gives Businesses 
A Flexible Advantage 

by Christian Perry 

In a slower era absent of the Internet and its 
loads of ever-connected devices, hindsight 
ruled the roost ;when it came to enterprise 
analysis. But as both enterprises and cus- 
tomers have grown to expect immediacy in 
business dealings, real-time analytics have 
emerged as a valuable tool that can help busi- 
nesses make intelligent decisions that more 
closely align with customer needs and help to 
save time and money 

The evolution and popularity of real- 
time analytics has spiked tremendously 
alongside the continuing innovation of 
chips and other technologies that can re- 
lay loads of enterprise information in mil- 
liseconds. In turn, employees can use this 
data logistically or strategically, based on 
how they choose to use it. For example, a 
fast food restaurant can examine numbers 
for orders placed this week and compare 
it against its real-time inventory to gauge 
supplies needed for next week. A utility 
company can use real-time data generated 
from sensors in the field to either allow ex- 
tra capacity or conserve capacity. Or an on- 
line retail company can instantly generate 
discounts or other sales measures based on 
real-time customer activity. 

"The ability to act on data as it's being ag- 
gregated in real time is critical to businesses 
today," says Amit Pandey, chief executive 
officer of Terracotta ( 
"Enterprises must be able to make decisions 
just in time and need to analyze the most 
up-to-date data possible to make informed 
decisions. Rather than being dependent on 
offline batch operations to aggregate and 
correlate historical data, businesses can be 
more effective by working directly with 
their current operational data in real time." 

Gaining An Upper Hand 

Today's real-time analytics market is 
deep and varied, but a typical deployment 



features analysis-driven software running either 
on existing standard hardware or specialized 
hardware (such as data warehouse appliances) 
designed to accommodate heavy data loads. 
This tandem of software and hardware gathers 
information, such as sales data, and displays it in 
charts, graphics, and other elements on a dash- 
board that's easily accessible and viewable. With 
this information, a business can instantly deliver 
more resources to a needed area or predict re- 
quirements for the coming hours, days, or weeks. 

U.S. Xpress Enterprises (, 
one of the nation's largest truckload carriers, 
takes advantage of real-time analytics in multiple 
fashions to ensure its pickup and delivery pipe- 
line flows without fail. For instance, the company 
uses geo-fencing to generate alerts when trucks 
near their destinations and send ETA alerts to 
customers expecting pickup or deliveries. The 
company also uses the technology for service 
failure notification, which generates alerts when 
trucks cannot reach their destinations on time, 
which in turn lets the company ensure customer 
satisfaction through real-time situational in- 
tervention. Maintenance also gets a boost from 
real-time analytics, thanks to fleet management 
feedback that routes equipment requiring regu- 
lar maintenance to a service depot when a time 
or mileage threshold is reached. 

Using information like this on an immedi- 
ate schedule can help enterprise businesses 
to distance themselves from competition that 
analyzes data after the fact. According to Rado 
Kotorov, chief innovation officer at Informa- 
tion Builders (, 
businesses can't really compete on the analysis 
of past data, because most are equally well- 
equipped to generate reports, analyze past 
data, and issue policies to correct business 
processes. Time is required to implement those 
policies, and that lapsed time is a sunk cost. 
The faster a company makes decisions, he says, 
the lower the cost and the more competitive it 
can be in the marketplace. But while the ben- 
efits of real-time analytics can be significant 
for many companies, it's an area that demands 
expertise and discipline. 

"Real-time analytics should be factored into 
an enterprise on the basis of the business's needs 
and readiness to consume the information, be- 
cause real-time analysis requires a better under- 
standing of the rhythm of a business than other 
forms of business intelligence," explains Tim 
Leonard, vice president for information technol- 
ogy at U.S. Xpress. "The right information at the 

wrong time can be misleading when trying to in- 
tegrate minute-to-minute changing flows of data 
into the decision-making process. The business 
processes and rules must be clearly understood, 
as well as how and when the new streams of in- 
formation can be used by the decision-makers 
and automated decision systems." 

Cost Considerations 

The costs required to deploy real-time ana- 
lytics can vary wildly depending on enterprise 
size and data scope. Free tools such as Google 
Analytics can provide substantial feedback on 
Web site visitors, while complex platforms that 
integrate with nearly every aspect of a business 
can cost tens or even hundreds of thousands of 
dollars. Some real-time analytics products are 
built into BI (business intelligence) platforms 
that cost plenty but add more significant levels 
of analysis across the business landscape. 

Norman Nie, a renowned pioneer in predic- 
tive analytics and now CEO of Revolution Ana- 
lytics (, says that 
the real-time analytics industry is still in its in- 
fancy. However, as the space moves away from 
expensive memory and servers to commodity 
hardware and software, the real-time process 
will begin to bloom. For example, Nie says, the 
emergence of databases such as Apache Hadoop 
and those from Netezza has helped to make the 
process more affordable because they can ef- 
ficiently handle the data in ways that the older 
systems could not. 

"The hardware and technology infrastruc- 
ture requirements and the options to implement 
real-time analytics can be significant — from data 
acquisition, to data cleansing, to data warehous- 
ing, to analytics," says John Lucker, principal 
at Deloitte Consulting (, "to 
technology integration of analytic results, to the 
business implementation tools and the organi- 
zational and customer monitoring tools for the 
analytics, to real-time performance management, 
and finally to adaptive controls which monitor 
and improve real-time analytics." 

Lucker recommends performing a full 
cost/benefit analysis that takes into account 
not only the cost of the analysis software and 
hardware, but also the inevitably challenging 
process required for implementation. How- 
ever, he and other experts are quick to iden- 
tify the cost of not using real-time analytics in 
today's business climate, because enterprises 
can pay dearly for what Lucker calls "lagging 
or ineffective execution." ▲ 

^ il 

"Properly implemented, rea 
time analytics should be used 
to drive quality assurance, 
time and cost reductions, 

needs, and identification of 
business opportunities," says 
Tim Leonard, vice president 
for information technology at 
U.S. Xpress Enterprises. 

"You will be able to maximize 
revenues, maximize market 
share, [and] maximize profit 
instead of waiting until the 
information that the world has 
changed in some fundamental 
way trickles up over months or 
even years. By then, the oppor- 
tunity is lost," says Norman Nie, 
CEO of Revolution Analytics. 

PC Tod 

Today/ April 2011 21 




▲ Companies are really 
just people — and most 
people fear being labeled 
"the bad guy." That fear 
puts the company at risk. 

▲ No one person should 
have enough power to 
completely destroy compa- 
ny assets or infrastructure. 

▲ Regular security audits 
are a key to protecting 
the company. 

▲ Security audits should 
include simulations 
that cover dealing 

with disgruntled or 
terminated employees. 

From Within 

What Happens When IT Goes Wrong? 

by Rod Scher 

Larry was an experienced system adminis- 
trator who had been promoted through the 
ranks and was now director of IT for a Mid- 
west business management and consulting firm. 
A longtime employee, Larry knew better than to 
violate the company's rule against moonlighting. 
But moonlight he did, and management decided 
it had no choice but to terminate his employment. 
The termination meeting went well, as those things 
go: Instead of tears and recriminations, there were 
smiles and handshakes and sheepish admissions 

that he'd made a mistake and a heartfelt apology 
for having caused this uncomfortable situation. 

The managers, relieved that things had gone so 
smoothly, told Larry (not his real name, of course) 
that he was welcome to retrieve his personal gear 
from his office and his computer, and hand in his 
keys and ID on his way out, so Larry went into his 
office and packed up his belongings. Then, using his 
high-level admin passwords, he connected to every 
one of the company's 11 servers and formatted every 
drive on every server. For good measure, he trashed 

22 April 2011 / 



the onsite backups. Then he grabbed his cardboard 
box of books and posters and family pictures, hand- 
ed his keys to the receptionist, and walked out the 
door with a smile. 

It took the company months to recover, and the 
final cost was estimated at $13 million. 

Problems Aren't Uncommon 

Security expert Chris Hadnagy, author of Social 
Engineering: The Art of Human Hacking, says that 
scenes like this play out regularly, mainly because 
companies fail to manage their employees. 'Too 
many times companies compromise on the rules and 
standards they know they should have in place, be- 
cause they are difficult to implement and not always 
the most comfortable/' 

This is not an isolated problem, says Hadnagy. 
"According to a recent industry report, there was 
a 27% increase in employee theft over the last year, 
with losses now totaling some $994 billion." Theft, 
fraud, and damage by employees is one aspect of 
owning a company that most people do not want to 
think about. "But," says Hadnagy, "the unfortunate 
fact is that if companies do not think about it, it can 
end up costing them dearly." 

No one wants to be the bad guy, but even some- 
thing as simple as setting and following procedures 
for hiring and firing can make a huge difference. 
Rigorous policies would help companies avoid most 
of these kinds of problems, say experts. 

Protect Your Company 

What Larry's managers should have done, says 
Hadnagy, is disabled his mail, network, and admin 
accounts during the meeting, and then had security 
supervise the cleaning out of his office. Yes, that 
could make people uncomfortable, but it's part of 
managing employees and running a business; being 
thought a nice guy is not worth $13 million. 

Companies need policies in place to limit poten- 
tial damage, including policies that detail how to 
handle the hiring and firing of employees. And at 
the root of those policies should lie the safety and 
security of the company and its employees, not the 
comfort and convenience of either the firing man- 
ager or the terminated employee. 

One excellent step, say security experts, is the 
establishment of regular and rigorous security au- 
dits — including audits that simulate terminations 
and disgruntled employees. 

A security expert we'll call "Martha" told us about 
going "undercover" in a financial services company 
that was worried about the stability and intentions of 
its lead system administrator. "The sys admin appar- 
ently had some performance issues," she says. "But 

every time they tried to talk to him about those is- 
sues, he would freak out — childish stuff. The company 
wanted to address his problems, but the managers 
were afraid that he would blow the company away." 

Martha went in pretending to do a HIPAA 
(Health Insurance Portability and Accountability 
Act) audit, but her real goal was to check out the ad- 
ministrator. In the end, says Martha, "My take was 
that he was a tech nerd who'd been left unsuper- 
vised for too long and who used the company as a 
playground simply because he could get away with 
it." The employee was buying toys and implement- 
ing the "latest and greatest" all the time, but not get- 
ting the more foundational, boring things done at 
all. "Also," notes Martha, "he was on straight salary 
and was paid very well, so he really had no incen- 
tive to meet various goals, because he was paid the 
same no matter what." 

The solution? "Have the other IT people step 
up and take on more responsibility. Make this guy 
be a real manager and give him clear, measurable 
goals that he can be held to." And, says Martha, 
"if there's no one else on staff with a comparable 
technical background — as was the case here — 
bring in quarterly oversight to review the budget 
and documentation." 

In this instance, notes Martha, there was plenty 
of blame to go around. Sure, the employee was im- 
mature and self-indulgent, but the company was 
also at fault. Employees need to be managed, and 
someone in this situation had abdicated a basic 
managerial responsibility. 

It's Your Policy, So It's Your Responsibility 

Employees have and need power, access to sensi- 
tive data and valuable equipment, and enough au- 
tonomy to encourage them to make the most of that 
power and access. But they also need oversight. 

Consider Martha's comment about the company 
worrying that a rogue employee might "blow the 
company away." An early security audit would 
have uncovered that risk and raised alarms: No 
company should ever confer on one person enough 
power to destroy an entire company. Allowing such 
a situation to exist in the first place is simply bad 
risk management — and bad risk management usu- 
ally boils down to bad management in general, say 
the security experts. 

In the end, there's no getting around the fact 
that people in positions of power require access 
to powerful tools; limiting that access would limit 
their ability to do their jobs. That means that noth- 
ing short of sensible policies, regular security audits, 
and intelligent, active oversight will protect a com- 
pany from the misuse of that power. ▲ 

PC Today/ April 2011 23 




▲ Net neutrality is the 
principle that the In- 
ternet should be a free 
and open network that 
permits equal access to 
all content. 

▲ Proponents of net 
neutrality want to 
prevent Internet service 
providers from dis- 
criminating between 
the types of content 
and applications online. 

▲ The FCC approved a 
regulation in favor of net 
neutrality that addresses 
issues of transparency, 
blocking, and unrea- 
sonable discrimination. 

▲ Legal disputes involving 
the FCC and telecommu- 
nications will continue as 
the debate develops. 

The Next Great Internet Debate 

by Joanna Clay 

If someone asked you to explain why the Internet 
should be a free and open network, how would you 
respond? Some might say that unfettered browsing 
makes for an even playing field between Internet ser- 
vice providers and consumers. However, others may 
reject the notion that the Web should remain a free 
and open technology, because if consumers want a 
better-quality Internet experience in the future, they 
should pay for it; after all, the Internet is big business. 
These responses are, in fact, the arguments presented 
on both sides of the Great Net Neutrality Debate. 

In the simplest of terms, Internet (or "net") 
neutrality is a principle that advocates for restric- 
tion-free Internet access, meaning that ISPs and 
governments would not restrict bandwidth or 
content at any level. Generally speaking, coalitions 
dedicated to Internet freedom — which include non- 
profits, businesses small and large (including eBay, 
Microsoft, and Yahoo!), and many independent 

bloggers — love the idea of sustaining a free and open 
Web community. By contrast, some major hardware 
manufacturers, ISPs, and telecommunications com- 
panies deride net neutrality as impractical and mak- 
ing no economic sense, instead favoring the ability to 
provide tiered, payment-based services and to con- 
trol bandwidth based on the type of data (limiting 
file-sharing networks, for example). 

There Are Two Ends Of The Pipe 

There is a lot of mud-slinging going on over net 
neutrality. To better understand what both camps 
truly believe, Tyler Clark, owner of Tyler Clark 
Consulting and chief imagination officer at Youngs- 
town Business Incubator (, 
explains that it's important to look at the two ends of 
the Internet pipe. "Think of drinking from a straw: 
the tech giants, like Apple and Google, are sucking 
from the end of the straw, and telecommunication 

24 April 2011 / 



(telcos) giants, like Comcast and Verizon, are fill- 
ing the cup with data." Clark explains, 'Think of 
the size of the straw as available bandwidth — it 
determines how quickly data can be consumed. To 
restore balance, telcos want to reestablish the value 
of their pipes by allowing most-favored partners 
to get a fast lane through the straw, squeezing out 
those getting data access for free." 

Clark says net neutrality means that even the 
leanest startup should have an equal footing with 
big corporations when it comes to customers' abil- 
ity to access data and services. However, Clark 
adds, one can also argue that data providers have 
the right to determine the rules for access and 
availability. Even so, he says, "there need to be 
safeguards in place to protect innovation, so the 
next big idea doesn't get locked out before it gets to 
leave the starting gate." 

According to Sarah Morris, a Google policy 
fellow at the Media Access Project in Washing- 
ton, D.C. (, one of the 
most common arguments against the enforce- 
ment of net neutrality rules "posits that there is 

adequate competition to protect consumers at the 
'last mile' of the Internet's delivery." 

In contrast, Morris says proponents assert that 
there is not enough competition at the last mile, 
especially in less densely populated areas. "The 
high switching costs associated with changing 
carriers thwart consumers' ability to switch pro- 
viders even if they desire to and happen to live 
in a region with more than one ISP," says Morris. 

The FCC & Net Neutrality 

In December of last year, the Federal Communi- 
cations Commission approved three new high-level 
rules regarding net neutrality for fixed and wireless 
networks: transparency, no blocking, and no unrea- 
sonable discrimination. 

Candice Johnson, communications director for 
the Communications Workers of America (www, offers some definitions to demys- 
tify these terms. '"Transparency/" says Johnson, 
"means that your ISP must tell you what they de- 
liver in terms of speed, cost, and network manage- 
ment practices. 'No blocking' means that Internet 
users can go where they want, when they want, 
to obtain legal content and that Web sites can't be 
blocked by broadband providers. 'No unreasonable 
discrimination' means that ISPs can't give special 
deals to some content providers over others." 

As of now, these rules protect basic Internet prin- 
ciples and hold wireless providers and other ser- 
vices accountable for their actions. More pointedly, 
the FFC's open Internet rules give federal regulators 
the authority to enforce net neutrality provisions for 
the first time, says Johnson. Unfortunately for pro- 
ponents of net neutrality, Congress has yet to pass 
the net neutrality anti-discrimination bill, officially 
titled the Internet Freedom Preservation Act of 2009. 

Some experts, however, insist government agen- 
cies aren't acting valiantly enough. M. Chris Riley, 
policy counsel for Free Press (, as- 
serts, "The FCC should take immediate steps to reex- 
amine and strengthen its rules and close the loopholes 
it created." He expects that the FCC's net neutrality 
rules will face legal challenges from all corners. 

Does The Internet Need Saving? 

The glaring reality is that we are all observing 
the initial stages of a virtual combat that may pro- 
duce plenty of political battles in the months and 
years to come. For example, Verizon and Metro- 
PCS have already filed suit against the FCC, and 
other ISPs may not be far behind. As the debate 
stands, claiming a decidedly "neutral" position 
in the net neutrality battle may not prevent you 
from getting caught in the crossfire. ▲ 

"Opponents argue that 
competition and an unregu- 
lated market for broadband 
services will take care of 
any harms that occur— if 
consumers don't like the 
practices that their ISP is us- 

ing to restrict them, they can 
switch to a different ISR" says 
M. Chris Riley, policy counsel 

PC Today/ April 2011 25 



Next-Generation Firewalls 

Make An Impact 

NGFWs Have Evolved To Provide Stronger Security 

Palo Alto Networks' 


company's powerful 

4000-series NGFW line. 

by Rod Scher 

Traditionally, firewalls have been stupid, mind- 
less beasts — which is a little disconcerting, 
given that for years you've been relying on 
them to protect your company Old-school firewalls 
are simple port-watchers. Leaving open the ports 
used for typical Web traffic, such as HTTP on port 
80 and encrypted SSL traffic on port 443, old-school 
firewalls simply relied on applications to "play fair" 
and use the ports they were intended to use. 

But there are problems with that approach. First, 
there's nothing that says that malicious traffic can- 
not use supposedly safe ports. And, while most 
firewalls will allow all traffic that originates from a 
supposedly safe, trusted network, 
outbound traffic need not be be- 
nign. Then, the explosive growth 
of social networking sites (and the 
platform-based apps that can reside 
on them) has meant that there are le- 
gitimate business uses for such tools, and business- 
es have therefore had to allow (potentially mali- 
cious) traffic to and from those sites and devices. To 
top it all off, ubiquitous (and potentially insecure) 
mobile devices can now access your corporate net- 
work from anywhere. 

"In the old days, applications had their own pro- 
tocols, so they could be filtered at the network layer," 
says security expert Chris Hadnagy author of Social 
Engineering: The Art of Human Hacking. "Now, ev- 
erything runs over HTTP, meaning through port 80. To 

Juniper Networks 

markets its SSG1 40 

modular security 

product for branch 

offices, regional 

offices, and 

enterprise businesses. 

filter that, you need intelligent 
security at the application layer, because simply closing 
port 80 would shut down all legitimate Web access." 

The result? The firewall you installed a few years 
ago is a sieve, and no longer capable of protecting 
your corporate network. 

Next-Generation Firewalls Defined 

NGFWs are a different animal. They are, by defi- 
nition, capable of examining traffic at the applica- 
tion level, distinguishing one type of traffic from 

another, and taking action based not on the port 
being used, but on the behavior of the individual 
application that's using the port. Rather than as- 
suming that port 80 is being used for "friendly" 
traffic (because, after all, that's what it's supposed 
to be used for), a NGFW is aware of the applications 
moving through it, and it enforces policies based 
not on the port in use, but on the specific identity 
of the application using it and on the rules set up to 
allow — or disallow — its behavior. 

In other words, while a NGFW may indeed offer 
standard firewall features such as NAT (network ad- 
dress translation) and stateful inspection, its salient 
feature is a more granular level of control that we 
characterize as "application awareness." NGFWs thus 
identify, categorize, and control application traffic 
based on policies set by network administrators. 

Because of this awareness, a NGFW can do much 
more than simply control port-based traffic: It provides 
a security mechanism that allows for intrusion detec- 
tion and prevention, anti-malware, antispam, VPN 
(virtual private network) functionality, and more. 

The Future Of NGFWs 

NGFWs are a nascent market. Gartner estimates 
that less than 1% of secure interconnections current- 
ly use a NGFW. However, numerous NGFW ven- 
dors have emerged, including Palo Alto Networks, 
Crossbeam, McAfee, SonicWALL, and others. Pric- 
es vary widely, depending on factors that include 
the number of gateways, device throughput under 
different security scenarios, maximum number of 
simultaneous sessions, and number of users sup- 
ported. Technical support can also add to the total 
cost. In general, you can find NGFWs (sometimes 
bundled into UTM [unified threat management] 
solutions that include functionality in addition to 
firewall protection) that range in price from small- 
office appliances, such as Juniper's SSG140 ($3,200), 
to Crossbeam's midlevel C25 ($23,995) to Palo Alto 
Networks' massively powerful PA-4020 ($49,000). 

Given the burgeoning and ever-adaptive mal- 
ware threat, it may be time to re-evaluate your se- 
curity tools; perhaps a NGFW is what you need to 
help keep your network secure. ▲ 

26 April 2011 / 




A Checklist 

by Seth Colaner 

Videoconferencing is an increasingly viable 
communication tool for businesses of all 
sizes. However, there is no one-size-fits-all 
videoconferencing solution; the one that fits best 
depends on the size of a business, the nature of a 
business, and what a business wants to accomplish. 

What You Need 

Larger businesses can opt for providing all em- 
ployees with desktop videoconferencing capabili- 
ties, multiple room-based systems, one or more im- 
mersive telepresence systems, or some combination 

An immersive telepresence 
solution such as the Polycom 
Open Telepresence 
Experience High Definition 
300 (OTX 300) is ideal for 
group-to-group meetings, 
training sessions, and other 

thereof. Whatever the configurations you choose, the 
muscle and might resides on the core of your net- 
work, in the IT closet. 

Laura Shay, director of product marketing for Poly- 
com (, says that Polycom empha- 
sizes the need for companies to sit down with them 
to determine what solutions are best for that company 
before spending a dime. "It's a very consultative ap- 
proach, all based on the person's applications, [looking 
at] what they are going to be doing with it." 

Polycom offers a wide range of videoconfer- 
encing products that are largely representative of 
what's available on the market. 

Systems may include per-seat licenses for as 
many employees as necessary, each endpoint (a 
desktop or a room) equipped with the necessary 

cameras, microphones, and videoconferencing soft- 
ware. The addition of a bridge, which can handle 
anywhere from a dozen or so users up to hundreds 
of users, enables multi-way videoconferencing; mul- 
tiple bridges, which can be placed in various offices 
or branches, multiply the number of possible simul- 
taneous users. 

You can also add a recording box to the system, 
which allows you to record video conferences and 
stream content to dozens of users. With the addition 
of a dedicated streaming box, you can create a sort 
of corporate YouTube where thousands of users can 
access recorded content at once. 

The creme de la creme solution is the immersive 
telepresence system, which is essentially a room 
containing a video display wall, the ability to hold 
simultaneous calls between large groups of people, 
and the ability to call virtually any other videocon- 
ferencing system. Immersive telepresence is ideal 
for corporate training sessions, conducting univer- 
sity classes online, and government applications. 

You don't need special bandwidth capabilities to run 
even the most elaborate system; the broadband Internet 
that most companies already have in place is sufficient. 

What It Costs 

The cost of a videoconferencing system varies 
widely. In general, however, the more functionality 
you add to a system, the higher the price. Instead 
of buying every component separately, it's typical 
to buy everything you need as a package from a 
single vendor. However, many customers buy the 
displays — typically large-screen HDTVs — on their 
own, as it's often more cost-effective that way. 

According to Shay, desktop endpoints cost in the 
neighborhood of $100 per seat, with rooms running 
anywhere from a few thousand to tens of thousands 
of dollars, depending on how elaborate a given 
room is. Bridges cost between about $25,000 up to 
a couple hundred thousand dollars, depending on 
how many simultaneous users they support. A re- 
cording box may cost around $25,000, and you can 
expect to pay approximately $75,000 for a streaming 
box. Immersive telepresence solutions run between 
about $150,000 to $500,000 per room, depending on 
the scale of a given installation and its amenities. ▲ 

PC Today/ April 2011 27 




A Checklist 

by Seth Colaner 

Videoconferencing is an increasingly viable 
communication tool for businesses of all sizes. 
Whether a lone telecommuter needs to chat with 
a project manager or multiple groups need to conduct 
a meeting from different locations, a video conference 
can be an efficient way to get things done. 

There is no one-size-fits-all videoconferencing so- 
lution; the one that fits best depends on the size of a 

Movi from Tandberg 
( is a 
simple desktop tool that 
allows remote users to access 
the company videoconfer- 
encing system and conduct 
calls from any desktop or 
notebook computer. 

business, the nature of a business, and what a business 
wants to accomplish with that particular set of tools. 

What You Need 

The needs of a large enterprise and those of a small- 
to medium-sized business are vastly different, as are 
the associated budgets. Because of the complexity 
and variety of options available, it's wise for SMBs to 
consult with a vendor before making any purchase 
decisions. This due diligence enables companies to get 
creative with finding a cost-effective solution. 

For example, an SMB may not end up getting 
strapped with some of the heftier costs incurred by 
larger organizations, says Laura Shay, director of 
product marketing for Polycom (www.polycom). 
"[With] anything less than 10 or 15 systems, all of 
that [core network] infrastructure is probably not 
needed," says Shay. In other words, an SMB may 
just purchase endpoints with a hardware codec and 
leave it at that. 

Such endpoints may be ideal for a single-room 
solution or if a company needs to grant videocon- 
ferencing capabilities to a handful of users — espe- 
cially in multiple locations. 

However, some SMBs may find that they already 
have many of the components needed for videocon- 
ferencing, including desktop or notebook comput- 
ers, microphones, Web cams, and so on. For these 
companies, buying one hardware codec and con- 
necting all their existing equipment to it may suffice. 

Yet another even less expensive option is simply 
installing videoconferencing software on employee 
computers on a per-seat license basis. Although 
that may sound like the many consumer-level video 
chatting applications available, such a solution dif- 
fers in that (assuming it's standards-based) it's not 
bound by a particular service. 

For example, if you use a given video chat ap- 
plication, you're likely able to chat only with other 
users of that same program or service; a standards- 
based desktop application allows you to chat with 
any other standards-based service. That allows 
users to call into any videoconference room or im- 
mersive telepresence unit. This is especially useful 
if a company has its own videoconference room but 
needs its remote workers to call in for a meeting; 
those remote workers can do so right from their cur- 
rent location, be it the office or on the road. 

What It Costs 

Polycom offers high-end executive desktop sys- 
tems, designed for executives who make high-level 
video calls, for $10,000 each. These systems include 
everything you need in one box, including the dis- 
play. Adding a single bridge to a cluster of several 
of these systems would add about another $3,000. 

If a company goes with a room system, they can ex- 
pect to pay as much as around $10,000 per room (times 
however many sites they need to outfit). Buying a 
single hardware codec that users can plug into will run 
around $5,000. Desktop videoconferencing software is 
billed on a per-seat basis at about $100 a seat. 

These solutions can be combined in a variety of 
ways to give a company a comprehensive, inexpen- 
sive videoconferencing solution that suits its specific 
needs within a relatively small budget. ▲ 

28 April 2011 / 


*->■% Freshen up 

H^~ H^> 



Deliver even more impact to your digital messaging with the 
NEC V Series, commercial-grade, large-screen LCD displays 
that provide a cost-conscious solution for digital signage 
applications. These 32", 42" and 46" models feature 
rear-mounted speakers, a public display-grade panel that 
protects against permanent image retention and a full selection 
of inputs, which allows you to connect to a wide range of 
peripheral devices. The high-performance panel and an 
abundance of advanced technologies that promote extended 
use, along with an adaptable cabinet design, make the V Series 
ideal for retail and restaurant markets, as well as indoor venues, 
training facilities and corporate boardrooms. 

V Series 

32" V321-2 
42" V421-2 
46" V461-2 

Available through: 

ForBusiness | 

J J 




Which Are Best For 
Your Company? 

The Lenovo ThinkCentre 

M58 Tower enterprise 

desktop features Windows 7, 

GMA4500 integrated video, 

and a DVD burner, but you 

can customize components, 

peripherals, and software. 

By Joanna Clay 

Desktop or laptop? It's a question you might 
ask yourself each time you buy a new per- 
sonal computer. While it's difficult enough 
to choose your own component preferences and 
requirements, making the purchasing decision for 
a small to medium-sized business is a challenge 
that requires thoughtful research, budget strat- 
egizing, and end-user consultation. 

So, What Are Your "Must-Haves?" 

Although practically all business desktops and 
laptops now include the ideal components to op- 
erate efficiently, some features 
will be more critical to 
your business than oth- 
ers. Consider the follow- 
ing questions during 
your research: Does a 
significant portion of 
your workforce travel 
regularly? Do your 
employees store a 
large amount of 
data on their 
PCs? What 
types of soft- 
ware capabilities does 
your particular company require 
from a business laptop? How will the majority 
of your employees use their business applications? 
Above all, what is your budget? 

When it comes down to a laptop vs. desktop 
faceoff, you can make things simple with a pros 
and cons list. And if you're in the market for 
either type of computer, you'll be glad to learn 
that we have outlined the benefits and disad- 
vantages of both styles. 

For Small 


Traditional desktops have been the go-to computers 
for companies up until the mid-2000s, when laptops 
made their mark as worthwhile investments. Take a 
look at what they have to offer your growing business. 

Why Say Yes? 

If this is your first round of purchases and the 
computing budget isn't what it could be, desktops 
may be your optimum choice. When assessing 
which components your workers are going to need 
most, think about whether or not extensive periph- 
eral support is important. For instance, designers 
and other members of a creative team may prefer to 
use large (19-inch and larger) monitors to collabo- 
rate on marketing projects. Specific desktop models 
typically include the multimedia ports to accommo- 
date two displays. 

Many professional towers can be configured to 
match your storage standards, as well. Desktops for 
basic business uses, such as email and word process- 
ing, probably won't need more than 100GB of hard 
drive storage (your network servers should be back- 
ing up data, regardless of what's stored on end user 
hard drives). However, manufacturers usually install 
more storage than necessary, with capacities ranging 
from 160 to 320GB. That's enough gigabytes to store 
plenty of graphics and videos — and you can easily 
attach an external hard drive to save additional data 
that you access frequently. Desktops are generally 
more "scalable" than laptops, too, because you can 
add supplementary hard drives and other compo- 
nents. The same can't be said for all-in-one desktops, 
although they have their own benefits (if space is of 
great concern) as they are tower-free systems. 

Economy desktops include integrated graphics, 
unless you upgrade a tower to a larger form factor 
that will support a discrete graphics card. A graph- 
ics card is necessary for running demanding vid- 
eography programs or visual editing suites. 

Theoretically, enterprise PCs are built to last and 
could be an employee's computing companion for at 
least five to seven years if the IT department deploys 

30 April 2011 / 



updates on schedule and services the systems regu- 
larly. Fortunately desktops are also designed for main- 
tenance, so IT staff can swap out or upgrade individual 
components as necessary. 

Why Not? 

The amount of physical space desktops occupy 
is a drawback. If you operate your business out of 
a small leased office, there may be little desktop real 
estate available. Traveling professionals may not ap- 
preciate the durability of a desktop, because they 
can't take it on the road. Obviously, if you have nu- 
merous road warriors working away from the office 
many weeks throughout the year, a desktop (or at 
least a desktop alone) won't suffice. 


Business laptops pack all of the necessities in 
one small form factor, but it's up to you to decide if 
that's a drawback or benefit. Here are the dark and 
bright sides of laptops for SMBs. 

Why Say Yes? 

By definition, a laptop is portable and functions as 
the business traveler's primary productivity tool (un- 
less tablets are a priority for your company). Thanks 
to Wi-Fi connectivity, telecommuters can easily work 
from home on a laptop. Business colleagues can swap 
demo presentations during a lunch meeting. A CEO at 
a wireless cafe in Madrid can videoconference with her 
purchasing manager in Boston. 

Part of the appeal of laptops for business is the 
"built-in" factor. Integrated Web cams make chatting 
convenient; embedded 3G mobile broadband capabili- 
ties enable greater connectivity; and increasingly pow- 
erful batteries provide six to eight hours of consecutive 
work time, on average. Moreover, laptops are able to 
support the same memory (2 to 4GB) and internal stor- 
age (hundreds of gigabytes) as any business desktop. 

For space-conscious business owners, laptops can 
help balance the office feng shui by not overwhelming 

L J 

the room with extra cables, monitors, and towers. Not 
all laptops are the same, though: desktop replacement 
laptops tend to be bulkier, whereas thin-line models are 
more travel friendly. 

Why Not? 

Laptops don't offer much ergonomic comfort. 
You can't use a wrist rest with a laptop, either, but 
the touchpad will 
prevent you from 
constantly scrolling 
your mouse's scroll 
wheel with one fin- 
ger. The keyboard on 
a laptop is compact 
and doesn't always 
feature a numeri- 
cal pad, though you 
do have the option 
of substituting a 
full-size USB key- 
board. Provid- 
ing a charging 
dock for end- 
user laptops 

is one of the best ways to keep a laptop recharged; 
otherwise, every one of your employees will be 
searching for an available wall outlet. 

The most obvious drawback is the added cost, 
even for fairly basic models. An extra $100 (or 
more) per model will get you more connectivity 
options and added capabilities; in fact, you don't 
have to try hard to break the bank when you order 
a high-end system that's outfitted with an HD dis- 
play and full security features. 

To Stay Or To Go 

As you contrast the benefits and disadvantages of 
desktops and laptops, consult our Takeaway chart so 
you can be prepared to find computing solutions that 
won't hinder your small business as it expands. A 






A "workstation" laptop 
such as the Dell Precision 
M4500 Mobile workstation 
can handle multitasking 
when you're working with 
numerous applications 
during a business flight. 








▲ Support for numerous peri 

▲ Plenty of configuration opl 


▲ Ideal for mobile workers 

▲ More wireless connectivity options 

▲ Generally less expensive 

▲ Everything-in-one form factor 

▲ Easy to maintain 

▲ Doesn't occupy a lot of space 

▲ Customization fees 

▲ Lack of ergonomic design 


▲ Occupies more office real 


▲ Requires battery charging and maintenance 

▲ Not for business travel 

▲ High price points depending on the brand 

PC Today/ April 2011 31 



Business Software 

The Latest Releases & Updates 

by Rod Scher 

Nothing ever stays the same, certainly not 
in the world of business-related software. 
Attempting to manage a business while 
keeping track of new and updated software releases 
is enough to try anyone's patience, so we'll give you 
a hand by letting you know what's available. 


SurveilStar has released its SurveilStar em- 
ployee monitor software, an application that lets 
administrators monitor employees' computer be- 
havior and activities. Users can download free 
trial versions of the program, which takes screen 
snapshots of employees' computer screens every 
second, records incoming and outgoing emails, 
tracks chats and instant message conversations, 
and monitors and records Web sites visited. The 
app is hidden from users and does not appear 
in the Windows System Tray, Start menu, Add/ 
Remove Programs, or Task Manager, and its his- 
tory logs cannot be deleted or altered. Only an 
administrator can block or uninstall SurveilStar. 

Windows XP 

Not a true release or software update, but none- 
theless a critical reminder for businesses using 
Microsoft systems and applications: WinXP is ap- 
proaching end-of-life, and Microsoft says that sup- 
port for both WinXP and Microsoft Office 2003 
will end in April 2013. Analysts say that being 
prepared for a shift away from WinXP and older 
versions of Microsoft Office will be critical, and 
note that many software vendors will cease testing 
their software on WinXP this year; that means that 
by next year, the lack of tested, WinXP-compatible 
software may become a critical issue. 


CompanionLink Software has announced two- 
way synchronization and backup of contacts, cal- 
endar, tasks, and notes between Microsoft Outlook 
and the HTC Inspire 4G. CompanionLink allows 
four sync methods: wired USB sync, automatic 
wireless sync via Google, syncing via local Wi-Fi, 
and a hosted wireless sync service. CompanionLink 
also supports syncing with IBM Lotus Notes, Sage 

CompanionLink offers multiple ways to sync contacts, 
calendars, and notes with your iPhone. 

ACT!, Palm Desktop, Novell Group Wise, Salesforce 
CRM, and Highrise. CompanionLink also syncs 
with multiple Microsoft Outlook add-ins, including 
Franklin Covey PlanPlus for Microsoft Outlook, 
Getting Things Done, and the Outlook Business 
Contact Manager. The CompanionLink wired 
USB sync for HTC Inspire is also compatible with 
Android's DejaOffice. 


The newest version of SmarterTrack's customer 
service software, a help desk app built for tracking, 
managing, and reporting on customer service and 
communications, including sales and support is- 
sues, is now available. Version 6.x includes a re- 
designed management interface and several other 
UI enhancements, including smaller page sizes, 
less JavaScript, and improved page load times. The 
new release also offers time logging, a feature that 
lets agents track the time spent resolving customer 
issues via tickets, live chats, or phone calls. In ad- 
dition, companies can generate reports based on 
the collected data and bill customers accordingly. 

Microsoft Dynamics CRM 2011 

Aimed at sales, service, and marketing or- 
ganizations worldwide, the newest version of 
Microsoft's CRM offering is now available via the 
Microsoft Download Center to customers with 
active Microsoft Software Assurance agreements. 
This release is meant not just for partner-hosted 

32 April 2011 / 



deployments and can be hosted onsite and run 
locally. According to Microsoft, the new product 
can support up to 150,000 concurrent users in a 
single instance while delivering sub-second re- 
sponse times. Earlier releases were launched under 
the Microsoft Dynamics CRM Online banner and 
delivered Microsoft Dynamics CRM 2011 as an on- 
demand service hosted at Microsoft's data centers. 

Oracle Healthcare 
Master Person Index 

Oracle has announced enhancements to Oracle 
Healthcare Master Person Index, the company's 
standards-based health-related solution. The 
product provides a single point of reference to 
information about a patient, clinician, or other 
healthcare person or entity within a healthcare 
organization. The new index enables organizations 
to create an integrated and consistent view of per- 
sonal data based on current applications and sys- 
tems. Oracle has also released a Web-based single 
view aimed at helping increase the quality of data, 
improving enterprise cost efficiency in delivering 
that information, and sustaining system usability. 
With the new release, healthcare organizations can 
more efficiently retrieve healthcare-related data for 
any entity, even if multiple systems reference the 
entity with different identifiers. 

Corel VideoStudio Pro X4 

Corel has released its newest video-editing 
suite, VideoStudio Pro X4. Important enhance- 
ments include automated stop-motion video, time- 
lapse, and creation of 3D effects. Performance is 
also improved, with optimized support for new 
families of CPUs, including Intel's Sandy Bridge 
and AMD's Fusion processors. The software also 
makes use of multiple CPU cores and graphics 
processor acceleration, so that even less cutting- 
edge processors can deliver optimum perfor- 
mance. Pro X4's Smart Proxy option temporarily 
reduces the video resolution during editing in 
order to enhance system responsiveness. The re- 
lease also features a new user interface, with un- 
dockable elements and the ability to show a video 
preview on a second monitor. 

Paperless 2.0 

Mariner Software has released Paperless 2.0, a 
Macintosh-based update of its digital document 
solution for home and business. More businesses, 
state and federal governments, and other entities 
are furnishing digital documents, thus making 
digital records preferred over paper, and requiring 
tools capable of managing those digital assets. The 

new version of Paperless enables the user to create, 
manage, and store any type of paper and digital 
document. Paperless 2.0 supports merged receipt 
and document libraries, custom fields, full OCR 
of English-language documents, and multiple file 
types, including PDF, Word, RTF, JPEG, and more. 
Although the product retails for $49.95, current 
users of Paperless can upgrade to the newest ver- 
sion for $24.95. 


Rapid Insight has 
released an upgrade 
to its business intelli- 
gence software, Veera. 
Among other enhance- 
ments, Version 3.6 of 
the product incorpo- 
rates data visualiza- 
tion into the product's 
toolkit, letting users 
meet reporting and 
analysis needs by 


Eiral AftjiwiKMiatKVTfito.ooiTt 

'•-■■ ;■■:;; Clarification 

a a 

Your CgmiwnY 

= 3=— " 

At Mng(t) 0«WifiS<l) COMnMU C) 

turning raw data into actionable information, such 
as charts, graphs, and visual dashboards. As a self- 
service business intelligence tool, Veera is aimed at 
enabling business analysts and nontechnical users 
to develop their own reports and ad hoc analyses. 
Veera includes a drag-and-drop analytic process 
builder that enables users to produce reports and 
analyses by merging, aggregating, cleansing, and 
transforming data from disparate file formats. 

Version 7 

RoboForm securely 
stores confidential data 
such as passwords, 
bank account numbers, 
and credit card num- 
bers, and simplifies 
the process of filling 
out online forms by 
securely storing user 
information. The new 
release offers an updated look, lets users import and 
organize bookmarks from all browsers, and features 
a Group Login tool that lets users log in to multiple 
Web sites with a single click. The new version also 
supports Google Chrome and Opera 10, in addi- 
tion to the already supported Internet Explorer and 
Firefox. The release now offers two licenses for users, 
one in which data is stored locally and one that in- 
stalls on multiple devices to allow data synchroniza- 
tion among all of the devices. ▲ 

The new release of 
SmarterTrack customer 
service software offers 
time logging, which 
lets agents track the 
time spent resolving 
customer issues. 

Mariner Software's 
Paperless 2.0 provides 
tools for managing 
digital documents. 

PC Today/ April 2011 33 




Energy-Conscious Tech 

by Nathan Lake 

devices that make 
our lives easier also 
produce some 

unwanted side 

effects on the 


Fortunately, many 
consumer electron- 

are working to cre- 

ate products that 
keep us productive 
while reducing 

to lessen our 

we take a look 


endlv technology 


A Battery Recharger For Normal Batteries 

Watts Clever 's Smart-Battery Charger ($46.10; will recharge 
most popular brands of standard alkaline AA and AAA batteries. Watts Clever 
indicates the device can recharge the batteries a maximum of 20 times depending 
on the type and quality of the batteries. The Smart-Battery Charger also features 
protections for overcharging, overheating, and battery type, so you know that the 
battery is being safely recharged. You also can safely charge Ni-CD, Ni-MH, and 
RAM batteries with the Smart-Battery Charger. 



A J 


When using Windows' built-in power saving modes, the OS relies on keyboard and mouse inactivity 
before placing your PC in a sleep mode. EcoAware (contact Sensible Vision for pricing; www.sensiblevision. 
com), from Sensible Vision, uses a Web cam to track your face for determining when to put your PC into a 
power-saving mode. And when the camera detects your face again, the PC will come out of its sleep mode. 
There are a variety of options for configuring how and when EcoAware powers down your computer. Manual 
controls are also available for specific functions. The EcoAware Desktop gadget will display a real-time esti- 
mate of how much energy you've saved beyond the use of standard Windows power schemes. 

Eco- & Checkpoint-Friendly Bags 

The ScanFast 2.0 Collection ($99.99 each; www of bags from Mobile Edge is 
made with a DuPont material that consists par- 
tially of corn stalks. The agricultural material is 
titled Sorona, and it requires 30% less energy to 
produce than petroleum-based nylon or polyes- 
ter, which can reduce greenhouse gas emissions 
for the product by up to 63%. Overall, the Sorona 
material contains 37% renewable sources. Bags 
in the ScanFast 2.0 Collection are also checkpoint 
friendly, so you won't need to remove your lap- 
top when going through security checkpoints. 
Briefcase, messenger bag, and backpack models 
are available. 

SunShot Program & Ten Million Solar Roof Initiative 

Recently, Steven Chu, the U.S. Secretary of Energy, indicated that $27 million in grants will be pro- 
vided to fund nine solar energy projects. Titled the SunShot program, the money will go toward im- 
proving the solar energy supply chain — with the overall goal of reducing solar energy costs by as much 
as 75% (down to $1 per watt) over the next decade. By making solar power cost around the same as 
conventional energy, power suppliers could make renewable power cost competitive. 

A similar program is the Ten Million Solar Roof Initiative, which was proposed by Sen. Bernie Sand- 
ers of Vermont in July of 2010. The initiative hopes to have solar panels and solar water heaters on 10 
million roofs by 2020. Although the bill struggled initially, it may have new hope with the help of the 
SunShot program. 

34 April 2011 / 



Electricity-Generating Glass 

New Energy Technologies ( has developed a working proto- 
type of its SolarWindow technology which is a see-through glass that can generate electricity. The first 
generation of its 12- x 12-inch prototype was created by spraying New Energy's electricity-generating 
coatings directly onto the glass, which would eliminate the need for costly or otherwise inconvenient 
high-temperature or high-vacuum methods of creating solar panels. New Energy indicates that the glass 
could generate electricity from both natural and artificial light sources. The organic, transparent solar 
cells would also allow light to pass through, so the glass would still make for a functional window. 

New Type Of Solar Cell 

A conventional solar cell converts sunlight into electricity using an electrolyte that contains a light absorb- 
ing dye, which degrades over time because of sun exposure. To increase the lifespan of solar panels, research- 
ers at Purdue are working on a type of solar cell that repairs itself. The research group is in the basic research 
stages of creating a cell that replaces the sun-damaged dyes with new ones, similar to the process that plants 
use. If the approach works, solar cells could work at full capacity for a longer period of time than they do now. 

:u!ts tn discrete energy levels and 
bulk semiconductor (V* =^1eV} 

>-. • 
*4 k V 


First SPC Gold Laptop 

The ThinkPad T420 (price yet to be announced; from Lenovo is the first 
to earn a Gold rating for SPC (Sustainable Product Certification). The SPC rating was cre- 
ated by the Underwriters Laboratories Environment standards organization, and a Gold rating 
means the device complies with environmental criteria for eliminating or reducing hazardous 
substances that can harm humans and the environment. The T420 also meets Energy Star's 5.0 
requirements, because it is built using low halogen and post-consumer recycled content and it 
exceeds the Energy Star 5.0 requirements by 10%. 

In terms of user benefits, Lenovo touts that the 4-pound ThinkPad T420 offers a maximum battery life 
of 15 hours, which can be extended to 30 hours with an optional 9-cell slice battery. The laptop 
also features Intel's Turbo Boost technology to increase processor speed when 
it's needed. Lenovo adds its Turbo Boost Plus technology, which lets 
the processor remain in Turbo Boost mode longer by keeping the 
processor temperature below the thermal cutoff. A Web cam and a 
noise-cancelling microphone with a 360 degree sound pickup range 
are provided for multiple users to participate in conference calls. 

Smart Glass 

Soladigm's ( Dynamic Glass windows are capable of electronically switching from 
clear to tinted, so you can control the heat and glare generated by the sun into a building without investing 
in window treatments that block the view. Soladigm indicates that the Dynamic Glass windows will reduce 
heating, ventilation, and air conditioning energy usage by 25%, and peak load in commercial buildings can be 
lowered by 30%. The company recently announced that it received $40 million in Series C equity financing, 
which will help it move toward high-volume production of the smart glass. 

PowerTrekk Fuel Cell 

Fuel cell technology converts the hydrogen in water into electricity, and Power- 
Trekk has created a Fuel Cell Charger (price TBA; designed 
to charge mobile phones, digital cameras, GPS devices, and other portable elec- 
tronics that charge via USB. We also like that the Fuel Cell Charger can provide 
power to power your devices, so you'll just need to insert the fuel cell, fill-up the 
water component, close the lid, and connect your electronic device directly to the 
USB port on the PowerTrekk. The PowerTrekk works with the company's Power- 
Pukk fuel cell, which are available in bundles of five, 10, or 24. 

^ — 

M if iimi mi 

PC Today/ April 2011 35 




A Telecommuting has met 
with positive reactions and 
expectations of improved 

A Little empirical research 
exists to corroborate those 

A One researcher found 
that prior research had ig- 
nored important questions 
about the effectiveness of 

A We often approach 
telecommuting as if it's a 
technology issue. It should 
be a business question that 
may or may not have a 
technological answer. 

s Telecommuting 
Right For You? 

Execs Cite Productivity Benefits, But Some Experts Doubtful 

by Rod Scher 

Depending on whom you ask, telecommuting 
is either a huge boon to productivity, or else 
it's the most over-hyped waste of time ever. 
Either way, there's no shortage of opinion. 

One of the reasons we argue about telecommut- 
ing is that we don't all define it the same way. Is it one 
employee working at home during a snowstorm? Or a 
group of employees who work full time out of home of- 
fices? Is it knowledge workers? Or is it the executives 
to whom the knowledge workers report? Can everyone 
telecommute, or only certain types of employees? 

According to Info-Tech Research Group senior re- 
search analyst James McCloskey, we need to be com- 
fortable with a certain degree of ambiguity when it 
comes to the term. "Telecommuting is some point 
on a set of points on a spectrum of remote working," 
he notes. "Is telecommuting your primary function, 

in which case maybe we call it telework? Is it some- 
thing you do with a tablet, smartphone, or laptop 
over Wi-Fi or AG or what-have-you?" 

Certainly there are plenty of enthusiastic en- 
dorsements from telecommuters and those for 
whom they work. 

"My whole agency is based on telecommuting," says 
Andy Abramson, founder of Comunicano, a boutique 
marketing consultancy. "As an agency owner, I am able 
to hire better people who, for a lot of reasons, no longer 
want (or are able) to go to an office. When people have 
to move, I don't lose them, because the only change is 
where they work — they need not change companies 
just because they changed location." 

Tresnic Media's Todd Giannattasio says, "I've 
been telecommuting one day a week for a few years 
now. I find that I am able to get much more focused 

36 April 2011 / 



on projects that need more time and focus when I'm 
at home. Also, I get home from work on Tuesday 
and set up my laptop, essentially making myself 
100% available for many more hours. And telework- 
ing gives me such freedom throughout the day that 
I don't mind doing a little work at night." 

John Freund, president and CEO of Minneapolis- 
based JumpTech, notes that the ability to telecom- 
mute helps him find and keep good employees. 
'Telecommuting has been a way to retain key tal- 
ent in our organization and a way for the company 
to show flexibility to our employees when matters 
arise that cause them to be out of the office. It allows 
employees to be productive on days where they 
would not be if we did not allow telecommuting." 

Positive Feedback— And A Paradox 

In fact, industry-wide, the reaction to telecommut- 
ing has been almost uniformly upbeat, with adherents 
painting the practice — and the technology tools that 
allow it — as the best thing to happen to business pro- 
ductivity since the invention of carbon paper. 

"What we're seeing," says McCloskey, "is a shift, 
a much more fluid back-and-forth between employ- 
ees' work-life balance." And, somewhat paradoxi- 
cally, part of that shift is a positive impact on em- 
ployees' lives: In spite of the fact that telecommuting 
allows 24/7 access to the office, says McCloskey, "it 
impacts work-life balance in a positive way because 
the real question becomes: Can an individual get a 
better work-life balance by being able to do the work 
that needs to be done quickly and effectively, and 
then being able to go back to their regular life?" 

McCloskey says that the answer is yes. "For knowl- 
edge workers, the desire is there to provide value 
whenever possible and as quickly as possible, but at 
the same time still recognize that we have lives outside 
of work. An awful lot of what we're seeing in terms 
of telecommuting adoption is to facilitate that on- 
demand participation by passionate knowledge work- 
ers; it satisfies their desire to help and satisfies the need 
to keep the business going, but at the same time does it 
in the most efficient way so that the individual can then 
get back to doing what they want to do in their per- 
sonal life. The reality is that those knowledge workers 
are not leaving the work in the office at 5 p.m. They're 
carrying it with them; they've got a passion to provide 
additional value whenever they can — telecommuting 
can be a very powerful way to do that without impos- 
ing as much of a burden on the individual." 

Risks, Doubts & Issues 

Not everyone is completely sanguine about tele- 
commuting, however, and even those who imple- 
ment it successfully may encounter problems. 

JumpStart's Freund, a fan of telecommuting, is 
nonetheless aware of its limitations. "What an em- 
ployee who telecommutes misses is the informal 
communication that typically takes place around 
the office. When there is a body at a desk, it's very 
easy for a co-worker to walk over and have a con- 
versation. It's the water-cooler conversation about a 
project that pops up, the conversation in the break 
room or at the lunch table that no one planned but 
suddenly happens. The informal communication is 
the biggest loss for the telecommuter." 

Of course, we like to seek simple answers to com- 
plex questions, and the question of telecommuting 
is indeed a complex one. It may be that it's some- 
thing that — in one form or another — works well in 
some instances and not in others. Brian Sutter, di- 
rector of marketing for Piano, Texas,-based Wasp 
Barcode, says that his company sees great value in 
telecommuting. "It's an effective way to improve 
productivity and employee morale, allowing for 
uninterrupted focus and eliminating the stress of a 
commute to the office." 

Nonetheless, Sutter echoes some of Freund's con- 
cerns, noting that telecommuting may be better suited 



W Reply & Eot > Playback i ^ UnfoBow I B Archive &3 Spam ^ Read 3 Un| added Renny Feb 26 
NDbuyuki added Cindy Wong Feb 26 

Nobuyuki: Sprint 5 team has evaluated 3 options and decided to go with #3. 


Remove Org Zoom From LH 

panel, which will allow us to display the questions as per the current design 
with mini charts mtegrated into every question module. We would use some 
workaround, such as caching to ensure that performance is acceptable 

We could redesign the chart 

so that the mini candlestick chart displays in a hover label when clicking a question module. Aisol 

rating scale would then get displayed within the hover label. That way I hope 

we can manage the performance as only chart needs to get calculated at a time. 

However the hover label cannot be delivered in G.4. as this operation is 

completely new to existing functionality 

Google Wave was aimed at providing telecommuters, among 
others, a platform for meeting, writing, and sharing. Google 
dropped the project after a tepid response from a public that 
was apparently not interested in such a tool. 

to some roles in the organization than to others: "We 
have had success with staff members in our support 
and product development teams working remotely 
for an extended period," he says. "But within the sales 
and marketing teams, we have found that prolonged 
telecommuting limits the organic office conversations 
that lead to better cohesion and employee engagement 
and more creative ideas." 

PC Today/ April 2011 37 




Info-Tech Research Group senior research 
analyst James McCloskey points out that the 
key telecommuting questions should relate 
to goals: "What is it that the organizations 
are trying to accomplish through a remote- 
working capability, and how can [telecom- 
muting] technologies support that?" 

"Telecommuting has been a way to retain 
key talent in our organization and a way 
for the company to show flexibility to our 
employees," says JumpStart president and 
CEO John Freund. 

"I haven't seen any solid studies indicating 
that [telecommuting] gains are both real 
and large," says professor Ralph Westfall of 
California Polytechnic University. 

As noted, most of the positive reports about the 
benefits of telecommuting tend to be anecdotal: 
Many people say that there are productivity (and 
other) benefits, but there is little empirical proof of it. 
Serious studies of the phenomenon are lacking, and 
few scholars have dedicated their time and exper- 
tise to the rigorous study of the presumed benefits 
of telecommuting. 

One who has is Ralph Westfall, a professor at Cal- 
ifornia Polytechnic University, Pomona. Dr. Westfall 
is the author of "Does Telecommuting Really In- 
crease Productivity? Fifteen Rival Hypotheses/' in 

which he examined what he called "the telecom- 
muting mystique." 

"There are a lot of consultants and vendors who 
make money selling services, products, books, etc. 
that promote telecommuting or are useful to tele- 
commuters," says Westfall. "Some of them publish 
research that typically doesn't control for many of 
the things I discuss in the paper. Doing better re- 
search would be more expensive and might not 
generate results that would be as effective from a 
marketing perspective." 

Westfall says that he has simply "not seen any 
solid studies that indicate that the cited gains in pro- 
ductivity are both real and large." Instead, he found 
a large number of variables that prior "research" on 
the topic failed to consider. For example, Westfall 
noted that telecommuting productivity gains may 
be overstated, productivity gains may result from 
non-telecommuting aspects of the implementations, 
increased costs may offset any productivity gains, 
and that gains — while real — may not be scalable. 

According to Dr. Westfall, there is little clear and 
irrefutable evidence that telecommuting increases 
either productivity or job satisfaction — or that any 
increases that do result might not have also occurred 
under other circumstances. 

Consider The Objectives 

Info-Tech's McCloskey says that the problem 
with our approach to telecommuting is that we ask 
the wrong questions. We ask: What sort of telecom- 
muting might benefit us? How should we go about 
implementing it? What technology should we use? 

What we should be asking, says McCloskey, is: 
Why should we use it? 

"What is it that the organization is trying to ac- 
complish through a remote-working capability," 
asks McCloskey, "and how can the technologies that 
are available support that? The big drivers from the 
organization's standpoint should be responsiveness, 
efficiency, and effectiveness." 

Simply providing a technology solution isn't ef- 
fective unless it's in the context of a business deci- 
sion, notes McCloskey. For example, perhaps the 
goal is to provide quick access to subject-matter ex- 
pertise. "That's a perfectly good reason to do it, and 
that might drive the use of home-working technolo- 
gies such as VPN access." 

Telecommuting technologies may or may not offer 
advantages; it's certainly not clear that they'll automat- 
ically result in a real and sustained improvement in 
productivity, efficiency, or morale, because in the end, 
this is not really a technology problem: It's a business- 
oriented, use-case problem to which technology may 
(or may not) provide part of the solution. ▲ 

38 April 2011 / 



Drives & Other Mobile 
Security Options 

Don't Leave The Office Without Them 

by Tom Nelson and Mary O'Connor 

Did you hear the one about your competi- 
tor's data breach? The personal information 
of thousands of their clients was compro- 
mised. The culprits weren't the usual suspects. No 
one breached a firewall or hacked into a server. No 
one compromised a Web site, and the IT depart- 
ment was able to say it wasn't their fault. 

So, Whodunnit? 

On a recent sales trip, the company's VP of 
marketing accidentally left his laptop at the air- 
port. An opportunistic thief quickly scooped it up 
and sold its easily accessible data on the identity 
theft black market. 

The moral of the story is that protecting your 
company's data isn't something that starts and stops 
at the building's front door. It's increasingly com- 
mon for mobile devices to be actively targeted as a 
way to gain access to a company's data. 

Data Protection For Mobile Devices 

There are a number of ways to protect your com- 
pany's laptops and other mobile devices. Many 
smartphones already have built-in data protection sys- 
tems. The most common ones let you remotely wipe 
a phone's data; others encrypt data on the phone, so 
that a password is necessary to gain access. The remote 
wipe function is available on some laptop systems, 


▲ SEDs (self-encrypting 
drives) contain hardware- 
based encryption engines 
that relieve a computer of 
processing the encrypted 

▲ SEDs that meet the 
standards defined by the 
Trusted Computing Group 
are interchangeable. 

▲ Software-based solu- 
tions are still viable alter- 
natives, and can meet the 
need for data encryption 
until SEDs are the default 
drive type in mobile 

▲ Alarms and lockdown 
devices are still an effec- 
tive way to keep laptops 
from going missing. 

PC Today/ April 2011 39 



but it's not a particularly effective method of securing 
data. Unlike smartphones, laptops aren't usually left 
on, or actively connected to a network that could be 
used to transmit the remote wipe command. 

Self-Encrypting Hard Drives 

Most laptop OSes already include some form of 
encryption software that you can use to encrypt a 
group of files or folders. But while this is better than 
nothing, it's not that much better. 

Abetter approach, at least in theory, is to encrypt 
the entire hard drive. You don't have to remember 
to activate the encryption system, because even you 
(the owner /user) can't use the laptop without en- 
abling it. But software-based data encryption tends 
to slow down the OS or cause compatibility prob- 
lems with some applications. 

The best solution is the self-encrypting drive. 
SEDs are specialized hard drives that use built- 
in hardware-based cryptography engines to perform 
encryption automatically, without user 
intervention. SEDs encrypt 
and decrypt data on the 
fly, as needed. With SED- 
based laptops, you provide 
a key or password when 
you turn the laptop on. Af- 
fied, the hard drive decrypts 



BitDefender Total Security 201 1 
($79.95 for one year; www.bit lets you create 
encrypted, password-protected 
vaults on your laptop or desk- 
top, for storing data securely. 

data as the OS accesses information. In this way, nothing 
is ever exposed, beyond the files that are currently in use 
by the OS or an application. And because the SED uses 
built-in hardware, there is little, if any, perceived perfor- 
mance hit. Even better, once you supply the initial key, 
the entire encryption process is transparent to both the 
OS and you. This ensures that SEDs work with almost 
all applications, and that you don't have to do anything 
special to achieve data security. When you shut the lap- 
top down, the encryption/decryption system locks all 
of the data and the drive in an unreadable state, until 
you turn the laptop back on and provide the key. 

SEDs support multi-factor authentications, so you 
can easily incorporate smart cards, biometrics, or other 
methods to provide additional security levels. It also 
makes SEDs easy to integrate into existing systems. 

SED Data Recovery 

SED devices have the same error and failure rates 
as standard drives; after all, they use the same tech- 
nology. The only difference is that SEDs have dedi- 
cated hardware in the drive controller to encrypt and 
decrypt data. As long as the encryption key, which is 
stored on the drive, remains intact, and you have the 
authentication key/password, you can conceivably 
recoup data using conventional data recovery tech- 
niques. However, should the encryption key become 
damaged, or should you lose or forget the authentica- 
tion key or password, recovery is all but impossible. 

In order to make SEDs more robust against data er- 
rors, most SED vendors create multiple copies of the 
encryption key and place them in different locations on 
the hard drive platter. This ensures that any single block 
error on the drive can't destroy the encryption key. 

Standardized SED Devices 

In February of 2009, leading disk manufacturers 
joined together and announced a single standard for 
SEDs. The Trusted Computing Group was tasked 
with developing, promoting, and defining the open 
standard for all SED devices, including hard drives, 
solid-state drives, and optical drives. 

Any SED devices that meet TGC standards are in- 
terchangeable. In addition, many software vendors pro- 
vide security applications that leverage SED standards 
and provide easy ways to manage SED devices. You can 
usually manage and configure your SEDs, create new 
encryption keys to replace factory-provided ones, and 
integrate multi-factor authentication systems. 

Most SED manufacturers, such as Hitachi, Sam- 
sung, and Toshiba, use the same drive hardware in 
SEDs as they do in their regular offerings. The only 
difference is the inclusion of the encryption engine 
within the drive itself. This means you can expect 
the same drive quality, performance, and MTBF 

40 April 2011 / 




(mean time between failures). You'll also find SEDs 
in the same drive sizes and configurations you're us- 
ing today, which makes it easy to include them in a 
maintenance upgrade plan for your company 

Taking hardware-based data protection one step 
further, you can purchase laptops that incorporate 
Intel's Anti-Theft technology, which combines SEDs 
with processors that monitor how the laptop is being 
used. The technology is also capable of deactivating 
the processor when it detects suspicious activity, 
such as multiple log-in attempts or the failure to 
check in with a corporate server. In essence, the lap- 
top will appear as useful as a brick to anyone who 
steals or stumbles upon it. If you recover the laptop, 
you can quickly restore normal operations with the 
use of special pass phrases or hardware tokens. 

Software-Based Encryption Solutions 

Hardware-based encryption isn't the only option; 
software-based solutions can provide most of the same 
capabilities, and allow you to enjoy the security of en- 
cryption without replacing laptops or hard drives. 

Software-based solutions, such as those from 
CryptoMill, can target just your data by creating vir- 
tual disks that always encrypt the data stored within 
them. Additionally, removable media can also be en- 
crypted, ensuring that, for example, a lost USB flash 
drive doesn't lead to a data breach. 

Offerings such as ZoneAlarm's DataLock, Micro- 
soft's BitLocker, and Trend Micro's Mobile Armor 
mimic how SEDs work, encrypting the entire drive 
and requiring you to supply a password whenev- 
er you start the laptop up. As with SEDs, encryp- 
tion and decryption happen in the background, so 
any file not in active use remains encrypted. When 

Qr You are fully protected. No action is required. 

I a 

Additional Services 

Checkpoint Zone- 
Alarm DataLock 
($39.95; www 
encrypts all of the 
data on a hard 
drive. Even if thieves 
boot from a CD or 
steal the drive, they 
won't get your data. 

you shut down your laptop, all data returns to the 
encrypted state. You may also find that the anti-mal- 
ware software you're already using has built-in file 
or disk encryption options. 

Security Measures Not To Be Overlooked 

This may seem old school, but it's still effective to 
lock down your laptop so it can't be easily picked up 
and spirited away. Yes, we're talking about the cable 

lock, that simple system of using a 
cable to tether your laptop to an im- 
movable object. 

Mobile Edge has updated the stan- 
dard security lock system with two 
options: one based on a combination 
lock, the other on a key system. Instead 
of attaching to your laptop's standard 
security connection point, the cable is 
bolted into your laptop's video port. 
The advantage is that the video port 
offers two strong connection points, 
allowing the security bolts to be an- 
chored to the laptop's frame instead of 
its external body. 

Of course, that option won't 
help when you're mobile, unless 
you don't mind being chained to 
your laptop. Targus makes a great 
substitute for a pair of handcuffs: 
the Targus DEFCON 1 Laptop Se- 
curity System. The DEFCON 1 is a motion-sensitive 
alarm system that attaches to your laptop and can be 
armed or disarmed with a combination lock. When 
armed, the alarm will sound if the cable is cut or mo- 
tion is detected. No more worries about grabbing a 
quick snooze while you wait for your flight. 

Making The Change 

SEDs are likely to be the common drive type in 
laptops in coming years. Some analysts suggest that 
SEDs will be a standard offering in as little as two 
years; and within five years, may be the only type 
of laptop drive available. This time frame is an im- 
portant one, because it matches the standard update 
cycle most companies use for their mobile 
computing platforms. But you don't have to 
wait until you update your laptops to meet 
your security concerns. 

There are a few options that are easy to 
implement. You can, for example, replace exist- 
ing drives in the laptops of key personnel with 
SED equivalents; wipe the old drives clean and 
move them to your parts inventory, for use as 
replacements in laptops not deemed a security 
risk; and use software-based solutions for em- 
ployees whose laptops don't carry corporate intellec- 
tual property or other critical data. 

Stay One Step Ahead 

In the long run, your laptops will all be SED- 
based (or an equivalent) within a few years. Plan- 
ning for the transition now should help you keep 
abreast of your corporate security needs, and make 
the transition smoother and more cost-effective. ▲ 

PC Today/ April 2011 41 



Apps For Road Warriors 

Improve Every Aspect Of Your Trip 

by Josh Compton Enterprise 
Edition reads your emails 
and text messages aloud 
as you drive. 

If you're a frequent business traveler, you know 
how important it is to stay connected to your 
co-workers and clients and how smartphones 
and laptops can help you do that. But you may not 
think about the many apps available on the market 
that can give you constant access to email and 
text messages, regular weather updates, and more 
when you're on the road. We detail some of these 
apps so you can make sure your next trip 
is easier and more enjoyable. Enterprise Edition is a BlackBerry and 
Android app (iPhone and Windows 
Phone 7 versions coming soon) that 
reads your emails and texts aloud as 
you drive. You can also set up custom- 
ized, automatic responses so you can 
keep a conversation going without 
needing to take your hands off the 
wheel. The Enterprise Edition is spe- 
cifically designed for business trav- 
elers because it features encryption 
technology that lets you read business 
texts and emails safely. A free version 
is available, but the full-featured En- 
terprise Edition will run you $7.99 a 
month or $79.90 a year per phone. 

The Weather Channel Max 

Keeping track of weather is impor- 
tant while traveling so you can prepare 
for possible delays and change your plans accord- 
ingly. The Weather Channel Max app for iPhone and 
iPad provides extensive weather coverage including 
maps, live radar, and even traffic cams in some ar- 
eas. You can save multiple locations, as well, so if 
you travel from one city to another, you can easily 
find the weather conditions in that area. The iPhone 
version is $3.99, and the iPad version is free. There is 
also a Desktop Max version that you can download 
and use on your laptop for $19.99 a year (seven-day 
trial available). 

MapQuest 4 Mobile 

True road warriors need maps, detailed di- 
rections, GPS navigation, and traffic updates so 

AT&T 3G 10:25 AM 

fu Marietta, GA [30062} = 

t, o pDeirait 

~ OToledo — 'Clevela nd 3m 

Findlay "'""" AK'MI ^H 
ia Mansfield w!tta| 
Marion O Canto** 

, d 


in Q Columbus Wf 




'- Mar 


The Weather Channel 
Max app provides 
real-time weather 
updates using radar, 
maps, forecasts, and more. 

MapQuest 4 Mobile 
not only features maps 
and directions, but also 
turn-by-turn GPS 
directions, as well. 

they never get lost and always take the quickest 
route possible. MapQuest 4 Mobile includes all 
these features with voice-guided, turn-by turn 
directions, mobile versions of maps from the Map- 
Quest Web site, and live traffic updates that re- 
fresh every five minutes. MapQuest 4 Mobile has 
an Auto Re-route feature that adjusts your route 
if you miss an exit or turn. You can also select 
the Energy Savings setting to consume less bat- 
tery power. MapQuest 4 Mobile is free for iPhone, 
iPad, and Android users. 


All trips have three essential things you need to 
have in place before you can go to your first meet- 
ing: flights, hotels, and rental cars. The free Kayak 
app is available for iPhone, iPad (Kayak HD), 
Android, BlackBerry, and WP7. It helps you keep 
track of your trip itinerary; look up deals for car 
rentals, hotels, and flights; and stay up-to-date on 
your flight status. You can also find airline infor- 
mation and book trips directly from your phone or 

42 April 2011 / 



European Gut n House 
761 Minns St 
Un Frandscc 

S4H -r.i -tnia Airport Marriort 
i 1 KB OW Bay! ho re Highway 



WO Carter Strwt 

$74 Clarion Hotel San Ffantisco Airport 

Kayak lets you track flight 
information and find car 
rental, hotel, and flight 
deals compiled from 
multiple travel sites. 

iPad. A PRO version ($0.99) of Kayak is available 
for iPhone that features all of the same features 
without the advertisements. 

Concur Mobile 

The mobile version of Concur for iPhone and 
iPad makes it much easier to manage your expens- 
es, receipts, and more. You can take pictures of your 
receipts using your device's camera, create expense 
reports, and submit them all from inside the app. 
Concur Mobile lets you track your flight status, 
search for hotels, and find restaurants and shops 
at multiple airports. You can also book taxis using 
included links to Taxi Magic. This app is free if you 
have an iPhone or iPad, but you must already be a 
user of Concur Expense, Concur Breeze, or Concur 
Travel, which you can sign up for at Concur 's Web 
site ( 


It can be difficult to remember when you start- 
ed your trip and ended it so you can keep track of 
mileage, which is important if you get reimbursed 
for travel. Automilez uses a GPS feature to auto- 
matically track mileage for each trip you take and 
create logs for easy viewing. Once a trip log is cre- 
ated, you can choose to send it via email or simply 
store it on your phone. You can view individual 

trips or see your year-to-date mileage. Automilez 
is a free app for iPhone and iPad that supports 
both miles and kilometers so you can use it in 
the U.S. or abroad. 


Even road warriors need to take 
a break every once in awhile, which 
is why Poynt is a great app for those 
who need to relax and find entertain- 
ment while traveling. You can search 
for local businesses, restaurants, and 
movie theaters and even purchase 
movie tickets or make dinner reserva- 
tions directly from your phone. The 
GPS features can find your exact lo- 
cation and display results for places 
in your area. But Poynt isn't just for 
entertainment, as it features gas price 
information and weather updates, as 
well. Poynt is free to download for 
iPhone, iPad, BlackBerry, Android, 
and WP7 devices. 


Yelp is a popular Web site that has 
restaurant reviews written by real peo- 
ple. There is now a free Yelp app that has much 
of the same functionality plus some special mo- 
bile features that make finding the right restau- 
rant easier while traveling. If you have an iPhone, 
iPad, Android, BlackBerry, Palm Pre, or WP7 
device, you can search for restaurants and other 
places around you using the location finder. View 
pictures of restaurants, read reviews and menus, 
and customize searches using different criteria. 
Yelp also features an interesting Monocle-based, 
"augmented reality" feature that lets you point 
your phone at a business and view an information 
overlay in real time. ▲ 

Automilez uses a built-in 

GPS feature to track your 

mileage and automatically 

create trip logs. 

.■■.. AT&T 3G 7:27 PM 43% » 

Report Summary 

O Receipt Image 

□Inner $99.00 

Jun 9,2010 

McD. Minneapolis, Minnesota 

Promotional Items £23.74 
Jun7 r 2010 i"ViS* ^ 
American ski, Vail, Colorado 

Meals $14.78 
May 12, 2010 — ,— . > 
CUB FOODS #1551 EDEN PR... &W 

Client Entertainment $147.55 
Apr 24. 2010 iiaftri > 

Concur Mobile 
helps you manage 
your expenses and 
create expense 
reports that can 
be stored or sent 
via email. 

Poynt makes 
finding restaurants, 
shops, and movie 
theaters easier so 
you can find time 
to relax while on a 
business trip. 

Price: $$ 
Hows Today 12:00 PM - 2:00 AM Open 
Transit Wellington (Purple 
Express, Brown) 

I Read 50 Reviews & 3 Tips 
Hands down the best fish and 
chips In the city. 

Map 2913 N Clark St 

<b/t Oakdale Ave & Surf S 
Lake view 
Chicago, IL 60557 

Yelp provides 
reviews and restau- 
rant information 
so you can find the 
best place to eat 
no matter where 
you are. 

PC Today/ April 2011 43 



For Your Tablet 

The Latest Software & Updates 

by Joanna Clay 

The tablet market and, 
along with it, the market 
for tablet apps are grow- 
ing each day. With your busy 
schedule in mind, we scouted 
the app stores and compiled a 
list of some of the most impor- 
tant and useful apps, tablet OS 
updates, and app tweaks. 

Upcoming HPTouchPad 
Will Run webOS 3.0 

HP plans to release the 
TouchPad tablet this summer, 
but its webOS 3.0 from Palm 
( is already big 
news. The most acclaimed fea- 
ture, so far, is Tap-To-Share (also 
known as Touchstone technol- 
ogy), which lets you transfer a call, document, song, 
text, or URL between a webOS phone (such as the 
Pre3) and the HP TouchPad by physically tapping 
the two devices together. You will also be able to ex- 
ecute "true multitasking." The practical application 
of this feature is that you can pause one app, tap a 

Because I had dropped out and didn't have to take the normal 
classes, I decided to take a calligraphy class to learn how to do 

Macintosh computer, it all came back to me. And we designed it 

all into the Mac. It was the firs* -nputer with beautiful 
typography. If I had never droDoedin on that single course in 
college, the Mac would have t> /had multiple typefaces or 
proportionally spaced fonts. Ano/slnoe Windows just copied the 
Mao, it' a li ke ly that no peraono l computer w ou l d have them. I f I 
had never dropped out, I would have never dropped in on this 
calligraphy class, and personal computers might not have the 
wonderful typography that they do. Of course it was impossible 
to connect the dots looking forward when I was in college. But it 
was very, very clear looking backwards ten years later. 

Again, you can't connect the dots looking forward; you can only 
connect them looking backwards. So you have to trust that the 
dots wiil somehow connect in your future. You have to trust in 

The Best Prompter Pro is a personal teleprompter 
that guides you through your speeches, helps you 
make notes as you practice, and lets you paste text 
from your email. 

webOS 3.0 on 
will feature true 
multitasking and 

new notification, send a message, read a blog post, 
and go back to the original app without closing any 
other app. You won't have to launch an app to start 
an email, either; you will simply start typing and 
then locate the contact. 

Use A Personal 
Teleprompter With 
Best Prompter Pro 

Designed to guide you dur- 
ing public speeches and lectur- 
ing practice, recently released 
Best Prompter Pro ($7.99; www functions 
as an automatic teleprompter, 
script reader, and cue card dis- 
play on the Apple iPad. The app 
supports Bulletin Board CODE 
text (for Internet forums), which 
is used to create formatting tags 
for the table of contents, headers, 
and text format options includ- 
ing bolding, italics, and lists. Us- 
ers can edit and change a script, 
— manage scrolling speed, scroll 
to individual text using gestures, and enable elapsed 
time. To personalize documents for teaching, podcast 
scripting, music, and other speaking engagements, 
you can copy and paste text from your email (and 
other supported apps); save your current editing spot; 
add custom backgrounds and colors; see estimated 
ending time; and import and export scripts through 
iTunes file sharing. The Markers feature inserts on- 
screen position indicators that you can follow as you 
read a scrolling script. 

Archos Releases Firmware For Multiple 
Internet Tablets 

Archos ( has made available 
the 2.1.8 version of its firmware that applies to the 
following Archos Internet Tablets: 28, 32, 43, 70, and 
101. The latest firmware adds support for keyboard 
layouts for particular countries and the network 
share option enables and disables network share 
scanning at Wi-Fi Access Points (via Wi-Fi authen- 
tication dialog box). Additional Wi-Fi fixes address 
network disabling after suspend and resume loops, 
as well as false state information prevention dur- 
ing Wi-Fi authenticating. The multimedia upgrades 
correct bad MP3 files, fix HD video files, and evade 
multimedia file deletion on SDcards. 

44 April 2011 / 



Notion Ink Adam Update Resolves 
General Issues 

The latest update for the Notion Ink Adam (www fixes browser bugs, improves video 
player issues, and tweaks general application features. 
To correct problems in the browser, Notion Ink fixed 
the tab switching focus (along with stability issues), 
changed the inconsistent tabbed count display for 
multiple tabs, and modified features in the address 
bar. In Canvas, the Adam will no longer restart an 

New firmware for the Archos 28, 32, 43, 70, and 101 
tablets fixes Wi-Fi and multimedia bugs. 

activity when you connect a keyboard. Also, in Text 
mode, Droid Sans italics are now disabled and lpx size 
text is fixed. In general, Notion Ink has improved pan- 
el view stability, added a new dialog box for network 
connections, resolved the Update Adam feature, and 
fixed a GPS coordinate problem. Additional enhance- 
ments reconcile issues related to Video Player, Panel 
Manager, Sniffer, Mail'D, and Calculator. 

Android Unveils 3.0 Honeycomb Upgrade 

Android's 3.0 platform, called Honeycomb, high- 
lights a new user interface, System Bar, Action Bar, 
customizable Home screens, updated multitasking 
capabilities, and a reshaped soft keyboard. The "holo- 
graphic" interface is designed to make interactivity with 
the tablet noticeably more content-focused with rich 
notifications, widgets, and engaging media. The Sys- 
tem Bar, which lines the bottom of the tablet screen, dis- 
plays notifications, system status, and soft navigation 
buttons. This feature now includes a "lights out mode" 
you can dim when you view videos in full-screen. 
Similarly, every application maintains the Action Bar, 
so you can control app options, widgets, and naviga- 
tion. The new availability of five custom Home screens 
with installed app launchers makes it possible for you 
to engage with widgets, app shortcuts, and wallpaper. 
Android 3.0 also features Recent Apps through which 
you may interact with the System Bar to locate tasks 
and move from one app to the next. You'll notice a re- 
designed keyboard; improved copy, paste, and search 

capabilities; and instant media file syncing via USB 
from a camera or PC. Addenda to these brand-new ad- 
ditions are standard app updates for the Web browser, 
camera app, photo gallery, contacts, and email. 

Ruminate Helps You Organize Messy Ideas 

Ruminate ($1.99; for Ap- 
ple's iPad creates text and URL bubbles that you can pin 
to a virtual whiteboard so your thoughts and sources 
are all on the same screen. By double-tapping in the Ru- 
minate app space, you can start a new thought, open 
a bubble for a Web site, or combine both. Tapping the 
Web tab opens the browser so you can tap the Import 
URL button next to the address bar; to pull a quote from 
a site, select the sentence or paragraph and tap Import 
Option on the pop-up menu that appears. You can also 
drag and link bubbles or put them in order using other 
gestures. When you finish bramstorming ideas for your 
paper, report, or essay, you can export the Ruminate 
outline as a text file. 

Get Comfortable With An Ergonomic 
Virtual Keyboard 

The newly released Thumb Keyboard ($1.84; www for Android tablets 
offers seven keyboard layouts specifically designed for 
thumb-typing. A split keyboard layout with the left half 
moved up and the right half moved down, relative to 
a standard QWERTY board, reduces finger stretching 
or awkward tablet manipulation. Widened keys also 
enhance this keyboard design, so you are less likely 
to accidentally press an adjacent key when you send a 
message. The app supports text prediction in five lan- 
guages, auto-correction, accents, quick-switch layouts, 
pop-up keyboards (for characters, numbers, and emoti- 
cons), and international keyboards. 

Fuze Meeting 
Available With 
Motorola Xoom 

Fuse Box has added 
Fuze Meeting (starts at $29 
per month for the Personal 
edition; wwwfuzemeeting 
.com) to the Honeycomb 
OS 3.0. Fuze Meeting hosts 
videoconferencing sessions 
in 1080p HD. One user can conduct a multi-party video 
chat from a single Xoom device. You can share your 
screen with all meeting attendees no matter their loca- 
tion. And, it only requires one step to add a new attend- 
ee to an ongoing audio or video conference. Enterprises 
embracing the consumerization of IT will appreciate 
this online collaboration tool as Motorola intends to 
market the Xoom as a business tool to rival the iPad. A 

The Android 3.0 

Honeycomb platform 

includes a new System 

Bar, Action Bar, and a 

host of app updates. 

PC Today/ April 2011 45 



For Your Smartphone 

The Latest Software & Updates 

by Nathan Lake 

Choose a playback location 

HTC Incredible 


With Skifta for Android, 
you can stream media 
to and from your 
Android mobile phone. 

You probably rely on your smartphone for 
many things, but with new software and 
updates, you can improve the efficiency and 
functionality of your mobile phone. We check out 
the most popular newly released software and key 
updates to help you maximize how you use your 
smartphone while you're on the road. 

New For Android 

Quickoffice announced its Quickoffice Connect 

Mobile Suite ($19.99;, which 
gives you full editing of Microsoft Office files and 
access to mobile cloud storage for popular services, 
such as Apple MobileME,, Dropbox, Google 
Docs, Huddle, and SugarSync. With an interface de- 
signed for use with Android 3.0, the program's inter- 
face creates a more user-friendly experience. You can 
view and edit Microsoft Office content in Office 2010 
or earlier versions. 

Skifta for Android (free; is the 
first Android app to be certified by the DLNA (Digital 
Living Network Alliance), which means it can stream 
media, including photos and music, from one 
DLNA source, such as a PC, to your Android 
phone. Alternatively, you can stream media on 
your phone to DLNA devices, such as televisions, 
IP-connected stereos, and game consoles. 

If you need to monitor the network usage 
costs on your data plan, check out Spb Software's 
SPB Wireless Monitor For Android ($9.95; The program can notify you 
when you reach a set limit, and it features daily, 
monthly, yearly, or custom period cost reports. 
You can view traffic reports per application as 
well as time-based reports, all of which you can 
export as CSV files. 

Fans of Sports Illustrated who want to read the 
publication on the go should try out the Sports Illus- 
trated app ($3.99 a month for digital only, free for print 
subscribers; from Time Inc. You'll get all 
the SI content you'd see in the print version. 

New For BlackBerry 

OnTime 1.2 ($4.99; 
from Ripple Mobile is a calendar application for 

BlackBerry. New features you'll find in the latest 
version include calendar filtering, which lets us- 
ers with multiple calendars select which ones work 
with OnTime, and there's a global drive or walk 
setting that will let you choose whether to receive 
alerts and directions for the given mode of trans- 
portation. One of the coolest features of OnTime 
is the location-based route mapping that uses the 
GPS in your BlackBerry to take into account your 

| Driving 


Uncheck a calendar if you don't want it to 
show up in your events 
i Default 

Social Networking 

Login to Ratebook 

Version 1.2 of OnTime lets you filter which calendars 
integrate with OnTime, and it can provide driving or 
walking directions to your next destination. 

current location, as well as the location of your next 
appointment, to provide directions. 

Bellshare recently changed the name of its Berry- 
Buzz app to BeBuzz ($5.99; 
Along with the name change, Bellshare released ver- 
sion 4.0 of BeBuzz, which now lets you change the 
standard-colored LED on your BlackBerry to another 
color and set custom alerts for specific contacts. In 
the latest version of BeBuzz, Bellshare places notifi- 
cations of incoming messages (titled toasts) placed 
near the bottom or top of the display. The app's 
sound profile settings now let you enable /disable 
LED, change audible reminders, and modify vibrate 
and toast configurations. 

SOTI added a variety of new features to version 
7.01 of its Pocket Controller Pro ($35.95; wwwsoti 
.net), which lets you remotely control your Black- 
Berry from a desktop or notebook computer. New 
performance options include a few keyboard short- 
cuts: An ALT button on the keyboard corresponds 
with the BlackBerry's ALT button; and the SHIFT 
and arrow buttons let you select multiple files 

46 April 2011 / 



fone lets you 
make free VoIP 
calls to your 
Facebook friends 
via your iPhone 
or iPod touch. 

or text for deleting or copying. The pro- 
gram is ideal if you want to use Black- 
Berry Messenger on a desktop computer, 
or if you want to display the BlackBerry 
screen in real time on a PC monitor (or a pro- 
jector) for presentations. 

With SRS' Call Notes Live ($9.99; www, you can add notes about 
a caller in your contacts list, and your Black- 
Berry will display those notes as the phone 
rings the next time the person calls. The 
idea is that you'll have the most important 
talking points before you on the caller ID. 
You'll also see the date and time that you en- 
tered the note. And when the call ends, a screen will 
appear where you can quickly update the live note for 
that contact. 

New For iOS 

What was formerly Facebook Messenger, Crisp 
App's fone ($1.99; lets you 
make VoIP calls to your Facebook friends using 
your iPhone or iPod touch. The voice chat app also 
lets you send instant messages via Facebook chat 
with alerts displayed via Apple Push Notification. 
You can also send photos from your album or cam- 
era, as well as view friends' walls without leaving 
the application. 

YouMail updated its iPhone Visual Voicemail 
Plus (free; New features in- 
clude a visual caller ID that displays photos of in- 
coming callers from the phone's address book and 
the caller's Facebook account, as well as the origi- 
nating city, state, and phone number. You can record 
specific greetings for given callers. Voice-to-text lets 
you forward the voicemail to an email address, and 









(w\ Facebook chat on 
^ your iPhone 

you can move the voicemail to a folder, so you can 
organize the stored messages. 

The StreetPilot App ($39.99; www.garmin 
.com) from Garmin provides you with many of 
the high-end features found on Garmin's stand- 
alone GPS devices. For example, you'll enjoy spo- 
ken turn-by-turn directions with traffic alerts that 
help you avoid accidents and construction. The 

You can use Currency Converter Pro and Windows 
Phone 7 to convert rates for 147 world currencies. 

Lane Assist feature directs you to the best lane for 
your destination. We also like that the StreetPilot 
App integrates with your iPhone's contacts to let 
you make and receive calls while the navigation 
continues to display on-screen. 

New For Windows Phone 7 

With Currency Converter Pro ($0.99; from Black Light Mobile, you can 
convert the value of 147 world currencies and six pre- 
cious metals. In version 2, Black Light Mobile added 
a Favorites section where you can select or save the 
currencies you access most frequently or delete the 
ones you don't use. Another new feature in version 
2 gives you the ability to view the last recorded rate 
should your phone have no available connection. 
Notifications will alert you when a selected currency 
falls below a given limit. 

moTweets ($0.99; from 
Panoramic Software was a popular Twitter client on 
Windows Mobile, and now it's available for Windows 
Phone 7. New features in moTweets include NearMe, 
which lets you view Tweets 
near your location and view 
them on a map, and Image 
Wall, which looks for images 
that you and others have post- 
ed within the Stream. You can 
add multiple timelines to the 
main stream and access a maxi- 
mum of six Twitter accounts. 

Want to do a little research 
on the wine you're drinking? 
Just download Vivino (free;, snap 
a photo of the bottle of wine you're drinking, and 
the Vivino app will use its image recognition tech- 
nology to bring up information about that particu- 
lar wine including ratings, facts, recommendations, 
food pairings, and prices. You can note whether you 
liked the wine, and even share the experience via 
Facebook or Twitter. ▲ 

PC Today/ April 2011 47 




Cisco Mobile 8.1 

At-Work Phone Functionality From Anywhere 

As Cisco aptly states, its Mobile 8.1 app 
"lets you place, receive, and manage calls 
over your corporate Wi-Fi network." The 
application also lets you use any Wi-Fi hot- 
spot via a VPN (virtual private network) to 
do the same. Thus, if you're on the road in 
a hotel room that offers Wi-Fi access with 
Mobile 8.1 on your iPhone, you can still tap 
into all the goodness of your company's te- 
lephony infrastructure. 

In addition to the app saving 
costs related to wireless calls, includ- 
ing roaming fees, Mobile 8.1 lets you 
place calls using your work phone 
number. This gives you the appear- 
ance of making calls from your com- 
pany office but also lets you maintain 
the privacy of your own personal 
iPhone number whether making calls 
in said hotel room, your home office, 
or a restaurant down the street. 

There are a couple of caveats to 
know about Mobile 8.1 before down- 
loading it. First, your company must 
be using the Cisco Unified Commu- 
nications Manager service. If it's not, 
the app won't function. Second, to take ad- 
vantage of the new multitasking ability 
added to this current version, your iPhone 
needs to be running iOS 4.2 (iPhone 3GS, 
iPhone 4, iPod touch 3rd and 4th genera- 
tion, and iPad are supported). If you're us- 
ing an iPhone 3G, Cisco instructs you to 
download and use Mobile 8.0. Additional- 
ly, tapping into the multitasking ability re- 
quires that your company previously made 
upgrades to its Unified Communications 
Manager infrastructure. 

Conveniently, Mobile 8.1 can hand off 
calls to a mobile network upon leaving Wi- 
Fi coverage. Further, it supports conference 
calls, transferring calls, and holding and 
resuming calls. Optional features include 
voicemail, company directory access, and 
voice command-based dialing. The app 
also adds support for Bluetooth headsets. 

48 April 2011 / 




|H- 1 

No Service «* 12:28 PM 




~ 2010 month calendar.xlt 

5/11/10 131 KB 


~ Class Schedule. xlt 

5/11/10 39 KB 


~ Gas Mileage Calculator. xlt a 

5/11/10 35 KB ™ 

~ Home Inventory. xlt 

5/11/10 20 KB 


~ Invoice.xlt 

5/11/10 21 KB 


~ Monthly Budget.xlt 

5/11/10 35 KB 


~ Packing Slip. xlt 

5/11/10 20 KB 


~ Time Sheet (Bi-Monthly). 

5/1 1/1 20 KB 

■■ © 

— Time Sheet (Bi-Weeklvhxlt 

& htto://1 0.0. .1.8:8080 



Mariner Calc 

$4.99 • 3MB 
Mariner Calc Spreadsheet (Rel. Jan. 26, 2011) 
from Mariner Software lets you create spread- 
sheets with multiple functions including finance, 
stats, and more. 

powerOne Financial 
Calculator-Pro Edition 

$4.99 • 3.8MB 
Infinity Softworks' powerOne Financial Calcula- 
tor-Pro Edition (Rel. Dec. 10, 2010) lets you calculate 
anything from simple math problems to finance, 
investing, and real estate equations all in one app. 

Lotus Notes Traveler 

Free • 0.4MB 
IBM's Lotus Notes Traveler Companion (Rel. Feb. 
22, 2011) displays Domino-encrypted emails on your 
iPhone. Your company must have a Lotus Notes Trav- 
eler server running Traveler or higher. 

Microsoft OneNote 

Free • 4.1MB 
Microsoft OneNote (Rel. Feb. 3, 2011) is the mobile 
version of the Microsoft Office software that lets you 
create customized notes that you can sync with Win- 
dows Live and view on your phone or PC. 

Multi Calc 6x4 

$0.99 -0.7 MB 
niumipad's Multi Calc 6x4 (Rel. Jan. 19, 2011) pro- 
vides four to six linked calculators on one screen so 
you can calculate complicated equations easier. Dis- 
plays calculations in portrait or landscape modes. 

Week Calendar 

$1.99 • 4MB 
IMITap's Week Calendar (Rel. Feb. 5, 2011) provides 
a weekly calendar view not available in the iPhone's 
stock calendar app. Also compatible with Microsoft 
Outlook, Microsoft Exchange, and Google Calendar. 

PC Today/ April 2011 49 




Advanced Call Manager 

More Call-Handling Options For More Situations 

" Answer or hang ur" According to 
Melon Mobile, those are your only choices 
when receiving a call on your device no 
matter how advanced it is. That is unless 
you've installed the company's Advanced 
Call Manager app, which essentially gives 
you a handful of options for handling calls, 
along with some personalization touches 
you can apply. 

At its core, Advanced Call Manager 
provides five alternatives for managing 
calls, including sending a caller a busy 
signal so as to "avoid acting rude by 
hanging up," signaling a busy tone that 
is accompanied by a pre-assigned SMS; 
letting a call pass through but muting 
the device's ringer; forwarding a call; 
and recording a caller's message direct- 
ly to the device vs. a voicemail box (cur- 
rently only available on Nokia devices.) 

The app supports various actions re- 
lated to caller profiles and to group lists, 
such as Work, Family, Friends, and so 
on. The lists' options let you set specific 
actions, such as allowing or blocking calls 
from callers belonging to specific lists; 
importing contacts from a phone to make 
creating lists easier; and setting actions per- 
sonalized to specific callers, such as send- 
ing a preconfigured SMS to a manager but 
blocking calls from other members of your 
Work list. 

Additionally, Advanced Call Manager 
includes a handy Scheduler feature that 
automatically puts the phone into different 
profile modes depending on a given cir- 
cumstance. A Locator function, meanwhile, 
switches the phone to different modes de- 
pending on where you're physically locat- 
ed, such as setting the phone to Work mode 
once you leave your office building. 

A free version of the app is also avail- 
able but limits options for saving and en- 
abling certain features. 

50 April 2011 / 

Advanced Call Manager 

Active mode 

# Accept all calls 

# Reject all calls 

# Accept phonebook only 
O Reject from black list 

# Accept from white list 
► Custom reject 



that featu 
the most sensitive data on the go, the Xporter Bolt. 


B » BI | 

B^p^s 'jd£$Liw compusa., 

computers & electronics 


Copyright © 1985 - 2011, Patriot Memory® LLC. All Rights Reserved. 





Reminder Super App 

$4.99 • 73KB 
QuiteSimple created RemindMe-The Reminder 
Super App (Rel. Jan. 20, 2011), which you can use to 
set automatic email notifications, send reminders 
to participants, and choose reminder icons. 

e-Mobile Stock 
Manager for BlackBerry 

$19.99 -244KB 
e-Mobile Stock Manager for BlackBerry (Rel. Jan. 14, 
2011) from e-Mobile Software provides up-to-date 
stock and mutual funds data. You can monitor your 
portfolio and track the performance of each market. 

Quintell Dashboards 2 

$29.99 • 337KB 
Quintell Dashboards 2 (Rel. Feb. 18, 2011) from Quin- 
tell Business Intelligence Pte. Ltd. is a mobile analyt- 
ics tool that displays spreadsheets converted to per- 
formance reports on your smartphone. Pinpoint data 
trends, find important performance data, and more. 


$1.99 • 19KB 

The Apps Pod created the Percentages app (Rel. Nov. 
22, 2010), which makes percent value calculations less 
complicated. Find the percent of a number, part val- 
ue, and percentage change from one value to another. 

HulloMail Smart 

$4.99 • 531KB 
HulloMail Smart Voicemail (Rel. March 1, 2011) 
from HulloMail Ltd. lets you manage, send, re- 
ceive, and share voicemail messages. 



Batterylcon (Rel. Dec. 9, 2010) from Toysoft De- 
velopment puts a battery percentage icon on your 
phone's home screen and adds the icon and a per- 
centage symbol to the Notification toolbar. 

52 April 2011 / 




Handheld Prevention & Diagnostic Care For Your Vehicle 

by Seth Colaner 

The CarMD® Vehicle Health System™ is the 
solution for anyone who's ever wished they 
could figure out what's happening under the 
hood of their vehicles at any given time. 

The Problem 

Most of us haven't a clue as to the health of our cars, 
trucks, SUVs, and vans until something breaks. Even 
so, we have to trust mechanics to diagnose, fix, and 
charge us appropriately for every issue, large or small. 
Further, although a vehicle might be otherwise in good 
shape, there may be something just slightly off that im- 
pacts gas mileage or wear and tear on a particular part. 

If you're a business professional, the vehicle you 
drive is part of your success. Whether you rely on 
rental cars for traveling or your company vehicle for 
meeting a client across town, you don't have time for 

The Solution 

CarMD is a handheld device (with software for 
your computer) that you can easily connect to your 
vehicle, use to perform a quick check of your car, and 
determine its overall health. You can also use CarMD 
to perform a detailed evaluation to track your ve- 
hicle's health in-depth over the long term. 

A quick check indicates the general condition of 
a given vehicle; a green light means that it's good to 
go, a yellow light indicates a potential issue, and a 
red light tells you that the vehicle needs immediate 
attention. Quick checks are useful for a number of 
situations, such as checking your rental car before 
driving off the lot or making sure your vehicle is in 
shape to pass emissions tests. 

For your own car or company vehicle, you can 
use CarMD to check the status of a huge number 

of parts and components, from air bags to water 
pumps. In addition to finding out if a part is failing 
or making sure the vehicle is operating at optimal 
efficiency, CarMD helps you diagnose problems 
and determine a reasonable cost for repair (which 
in turn gives you leverage when working with a 
mechanic). CarMD also delivers updates about re- 
call notices and service bulletins. 

How It Works 

The handheld CarMD device connects with 
the DLC (Data Link Connector) that resides 
under the dashboard of all vehicles manufac- 
tured since 1996. (If you're unsure where the 
DLC is located on your particular vehicle, you 
can find out at When you 
connect the device to a PC or Mac computer, you 
can use the CarMD software to check that data 
against CarMD's online database for diagnostic 
help, projected repair costs, and more. 

Your purchase of CarMD includes lifetime 
firmware and software updates at no additional 
charge, which will keep both the device itself and 
the knowledge base to which you have access as 
current as possible. 

The Road Ahead 

By the end of 2011, CarMD will launch an app 
for various mobile platforms that will augment 
CarMD's services; stay tuned to 
for new product and service announcements. 

And if you find yourself stuck on a lonely 
road somewhere and can't get to your com- 
puter, you can call CarMD's ASE (Automotive 
Service Excellence)-certified technicians toll-free at 
888.MyCarMD for timely expertise. ▲ 

CarMD, with its ability to 
instantly diagnose vehicle 
problems, is especially useful 
for business travelers who 
can't afford unnecessary and 
unexpected downtime. 


and use the promo code 
PCToday to receive 1 5% 
off the regular price of a 
CarMD Vehicle Health 
System (MSRP $11 9.85). 

PCToday/ April 2011 53 




by Andrew Leibman 



d out the bei 

phones rur 

ta version of its HTML5-based cloud printing 
I 2.1 or newer and iOS-based devices running 

version 3 or newer. With Google Cloud Print, you can quickly anc 
emails and Google Docs documents from vour smartphone bv launcl 

Web browser, opening a document in Google Docs or an email in Gmail, tapping 
the arrow button in the top-right corner of the screen to view additional options, 
and then tapping Print. If you're viewing an attachment, such as a PDF or DOC 
file, you can use Google Cloud Print by clicking the corresponding Print hyperlink. 

Inbox Archive ^ 
TPS report time Inbox H Reply 
Scott Eblen & I M Pve _ 

Don't forget, TPS reports are ( 
8 a.m. on Monday morning. [ 
don't bother emailing them -5 Mute 

And make sure they're staple* 
Milton if you if need to borrow 



A third-party security app 
can help ensure your device 
is protected against malware 
and more. 

But first, you need to set up the service by launch- 
ing Google's Chrome browser on a PC connected to 
your desired printer (Note that if you attempt to set up 
the service using any other 
browser, you'll be directed 
to download and install 
Chrome before proceeding. 
The Web site wwwgoogle 
.com/cloudprint provides 
detailed instructions for set- 
ting up Google Cloud Print.) 
First, click the wrench icon 
in the upper-right corner of 
Google Chrome, select Op- 
tions, click the Under The 
Hood tab, scroll down, and 
click the Sign In To Google 
Cloud Print button. Sign 
in using your Google account 
username and password, after 
which you'll see a dialog box 
indicating that you successfully 
enabled Google Cloud Print. 
You can either print a test page or click OK to exit. If 
you chose to print a test page, click the appropriate but- 
ton on the subsequent page, and then click the Print A 
Test Page Button. Back on the Under The Hood tab of 
the Google Chrome Options, the Google Cloud Print 
section will now have Disable Google Cloud Print and 
Manage Print Settings buttons. 


With the news that Google recently stumbled 
upon several dozen apps in the Android Market 
that were both pirated software and infected with 
malware, security is now officially something you 
need to worry about on your smartphone. Google 
had since remotely removed the offending apps 
from afflicted phones, but it took several days. What 
follows are our best recommendations for taking a 
proactive approach to protecting your device. 

The adage that begins, "If it's too good to be true 
..." holds true for the Android Market, as well. Be- 
fore downloading an app, especially a free one, do 
more than just read reviews on the Android Market; 
read reviews from reputable sources. 

It's a good idea to research the app's publisher, 
visit the developer's Web site (you can do this by 
tapping Visit The Developer's Web Page from the 
Android Market listing), and look at the other apps 
it offers (you can do this by tapping the View More 
Applications from the Android Market listing). For 
example, we noticed that the developer of a free Tet- 
ris clone currently available on the Android Market 
linked to the generic site for the 

developer's Web site, yet the game was not avail- 
able there, nor was the developer's name. 

Also, avoid downloading apps that encourage 
copyright violations, especially through music, 
video, or ringtone downloads. Closely examine 
the permissions any app requires before finalizing 
a download. A wallpaper app probably shouldn't 
require access to your identity. 

Avoid sideloading, or installing apps from third 
parties outside of the Android Market, whenever 
possible. Many legitimate, malware-free apps re- 
quire sideloading, so you don't need to swear it off 
entirely, but treat these apps with extra caution. 

Google Cloud Pnn ■ :. : :- - :.~s - : ■-:-■:; -. - - 
intuitive accesshi 3 := . e _ '.:: _-.'.-. ■- - : 

:;'"! "s-'i .;■..• ;■ n;e:'s 5.8 s;.e ::■ .:. : :" ?" . "-:'.: i '. :.._:. 
Print enabled web or mobile app. 

fy Print from anywhere 
/ ./' -::ni : . : "i = - : - .-■ :•: -.. . t ■■ = ■:-■ ■■;■■= 

^r Learn more 

Google Account 

Email: anrire lei - siT _ - = 


io your printers with any Google 

Install a malware and antivirus scanner on your 
phone. There are several available, many of them 
free, but treat these like you would any other app, 
and do your homework. 

■ BlackBerry 


Aside from the novelty aspect, assigning distinc- 
tive ringtones to certain contact groups can help you 
immediately identify whether the call is personal or 
work-related, for instance. To assign a ringtone to a 
group of contacts, navigate to Profiles on the Home 
screen, select Advanced, press the Menu key, select 
New Exception, type a name for the exception (such 


Enter your Gmail 
credentials to enable 
Google Cloud Print. 


When you're traveling to an area in which your cellular data plan does 
not support coverage, especially abroad, it's a good idea to take your Black- 
Berry offline. The easiest way to do this, instead of simply shutting the 
BlackBerry off, is to scroll to and select the Manage Connections icon from 
the Home Screen, select Mobile Network Options, select Data Services, and 
then turn off Data Services entirely or set When Roaming to Off. 

as work), scroll to the From field, press the trackball or 
trackpad, select Add Name, and then select a contact 
from the Address Book. To add additional contacts, 
just press the trackball or trackpad again, select Add 
Name, and choose another contact; repeat this step 
for every contact you want to add to the group. Next, 

PC Today/ April 2011 55 



BlackBerry Messenger 

BlackBerry Messenger is a great 
way for fellow BB users to keep 

With multitasking come 
memory management issues. 

scroll to Custom Phone Tune field, press the trackball 
or trackpad, select the ringtone you want to identify 
with the group, press the Menu key, and select Save. 




With ubiquitous QWERTY key- 
boards, BlackBerrys are popular with 
heavy messengers. The BlackBerry 
Messenger app is a chatting utility 
that allows unlimited characters and 
is designed just for BlackBerrys. To 
start a BlackBerry Messenger conver- 
sation, just select the BlackBerry Messenger icon from 
the Home screen, select a contact from the BlackBerry 
Messenger contact list, type your message, press the 
trackball or trackpad, and then click Send. 


If you use your BlackBerry primarily for work 
purposes, it's a good idea to set your BlackBerry 
to shut off overnight and restart automatically the 
next morning. To do this, scroll to and select Op- 
tions from the Home screen, Auto On /Off, enable 
the Weekday and /or Weekend options, and then set 
a schedule under the appropriate heading. 

■ iPhone 


Now that multitasking has made its way to 
iPhone (4.2 and newer), killing apps is a necessity 
from time to time to maintain battery life or man- 
age performance on older devices. To kill an app, 
you'll need to access the multitasking drawer by 
double-tapping the Home button, then press and 
hold your finger on an app icon. When the apps 
begin to wiggle, you'll see a red icon in the upper- 
left corner of the apps. Next, just tap the red icons 
on the apps you want to kill. 


With the latest version of iOS (4.3), Apple has 
decided to let you choose whether the side switch 
locks the orientation, like it originally did upon 
launch, or mutes and unmutes sound, which is sim- 
ilar to how the iPhone works. To take your pick, tap 
Settings, General, and then under Use Side Switch 
To, select either Mute or Lock Rotation. 



The default search engine on your iOS-based 
device is Google, but you can change it to Bing or 




When your iOS 4.2 or ne 

rwer iPhone is docked 

and synced, you can create 

folders and add apps 


to them right from within i 

Tunes. To do this, first 

connect your iOS-based de\ 

ice to your PC or Mac, 

launch iTunes (if it does not 

iaunch automatically), 

select the device from the 

eft side of the iTunes 

screen, click the Apps tab, z 

md then just drag and 

drop your apps into folder 

s as you see fit. Click 

Apply when you're done to 

sync the changes. 


Use Side Switch to: 
Lock Rotation 


Date & Time 


iPad users can 
configure the Side 
Switch to either 
mute/unmute or 
lock orientation. 


Yahoo! if you like. To do this, tap Settings from the 
Home screen, Safari, Search Engine, and then tap 
Google, Bing, or Yahoo! to make that your default 
search engine. 


Users with an iPhone 4, iPad, or fourth-gener- 
ation iPod touch running iOS 4.2 and newer now 
have free access to the Find My iPhone feature of 
MobileMe, Apple's cloud-based service for syncing 
your data between multiple iOS-based devices. If 
you ever lose your iPhone, Find My iPhone lets you 
log in to from any Web-enabled computer 
and locate your iPhone on a map. To get started 
with a supported device, just search for and install 
the Find My iPhone app from the App Store. Then 
launch the app and log on using your Mobile Me 
Account. If you do not already have a Mobile Me 
account, access Settings from the Home screen and 
then tap Mail, Contacts, and Calendars. Tap the 
Add Account option under Accounts, tap Mobile 
Me, and then input your Apple ID in the appropri- 
ate fields. Now recovering your device should be 
easier than ever. 

You can also activate Find My iPhone on mul- 
tiple devices. And as long as at least one of them is 

56 April 2011 / 



Find My iPhone shows 
the location of your 
device on a map. 

an iPhone 4, iPad, or fourth-generation iPod touch, 
you can enable Find My iPhone on older iPhones, 
including the 3GS and 3G. Once Find My iPhone 
is configured on one of the newer devices, down- 
load the app to the older 
device and sign in using 
the Apple ID you use for 
the newer device. Now 
from the Find My iPhone 
app's Devices screen, you 
should be able to locate ev- 
ery device associated with 
the Mobile Me account. 

■ WebOS 


The webOS Facebook 
app has three basic navigation 
methods: the top bar header, the 
Navigate To option in the drop- 
down menu that you can access 
by tapping in the top-left corner, and gesture- 
based shortcuts. The gesture area on webOS-based 
phones, including the Pre and Pixi, enable you to 
do some pretty basic functions, such as navigating 
forward and back through apps and messages. To 
perform a gesture-based action, simply hold your 
finger in the gesture area and press a letter key. 
These key-bound actions vary by application, and 
the Facebook app supports several different gestures. 

To perform the Facebook-based shortcuts, first 
launch the Facebook application by tapping the 
Launcher and then tapping the Facebook icon. If 
you're using a Palm Pre, slide open the keyboard. 

To get to your News Feed from any other loca- 
tion in Facebook, press and hold your finger in the 
gesture area and then press the H key. You can also 
skip to the bottom of the News Feed page by per- 
forming this action from here. To move back to the 
top of the feed, perform the action again. 

Access your Facebook photos from any location in 
the Facebook app by pressing and holding your finger 
in the gesture area and then pressing the P key. 

You can initiate a search of your Facebook friends, 
all users, or pages by pressing and holding your finger 
in the gesture area and then pressing the S key. Then 
just tap the category and type your query. 

To quickly access your Facebook Inbox, just 
press and hold your finger in the gesture area and 
then press the I key. Pressing and holding your fin- 
ger in the gesture area and then pressing the U key 
will pull up your Profile page, otherwise known as 
your Wall, where you'll see all of your status up- 
dates and activity. 

View events by pressing and holding your finger 
in the gesture area and then pressing the E key. Tap 
the Birthdays button at the bottom of the Events 
page to see who among your friends is having a 
birthday soon. 

The gesture you may use most often is the one 
that brings up your Notifications. To access these, 
just press and hold your finger in the gesture 
area and then press the N key. New Notifications 
will appear bolded. 

■ Windows Phone 7 


By default, the Windows Phone 7 Marketplace 
app is on the Start screen, but if you ever see a 
number notification beside the icon, then you 
know you have apps that need updating. To up- 
date these apps, tap the Marketplace icon and then 
tap Update from the bottom of the screen. On the 
next screen, you can tap Update All or select the 
apps individually to update them one at a time. k 


If you're like us, you prefer to view your Most 
Recent news posts on Facebook rather than the Top 
News, which displays a kind of "best of" based on 
the profiles you interact with the most. But on most 
versions of Facebook, Top News is the default view. 
Accessing the Most Recent view is actually easier 
on Windows Phone 7 than other platforms; all you 
have to do is launch the Facebook app, tap News 
Feed, and then scroll once to the left. Now you'll 
be hip to everything that's going on in your social 
circle, even if your social butterfly likes to perch 
on wallflowers. ▲ 


What's on your mind? 


Connie Chan Q 1 & 2 

Angel descent 4 days ago 

View Album 

Facebook on webOS 
supports a multitude of 
gesture-based shortcuts. 


Windows Phone 7 has a Find My Phone app built in, which lets 
you recover a lost or stolen Windows Phone 7 device. But before you 
can start using the handy feature, scroll left to access the apps list, tap 
Settings, scroll to and tap Find My Phone, and then tap the checkboxes 
for Save My Location Periodically and Get Results Faster (the latter 
option warns you that it may impact battery life). Once set, tap the 
Windows button to return to the Start screen. 

Now, you can log in to on a desktop or 
notebook PC using your Windows Live ID and then click Find My 
Phone. There are three buttons here that let you Ring it, Lock It, and 
Erase it. Click the Ring It icon to force your Windows Phone 7 device 
to ring, even if it's on silent or vibrate mode. This is useful for when 
your Phone is nearby. The Lock It button locks your phone so that 
nobody else can use it. You can also configure the phone to display 
a message on the screen. Click Erase It to remotely remove your data 
with a complete factory reset. 

PC Today/ April 2011 57 



Mobile Web Notes 

New & Updated Sites & Services 

by Seth Colaner 

When you're away from the office, your productivity doesn't have to stop. 
The Web is exploding with mobile sites and online services, including office 
tools, news alerts, entertainment, and any number of other useful items. Just 
as quickly, it seems, others go under, are bought by larger companies, or 
simply evolve into something different. We've found some of the freshest and 
most useful sites, services, and updates for you to consider. 

Simple. Fast. 
Enter a .mobi: 


~) ( Wholz it? ") 

Tip: You can enter followed by 
the domain in the URL to quickly pull the 
WHOIS info for any .mobi (e.g. 
whoiz. mobi/dating ). Note that the extension 
is not required. 

Firefox 4 Mobile Beta 

Mozilla announced that Firefox 4 Mobile for 
Android and Maemo is now available in beta. You 
can snag the new version from the Android Mar- 
ket or directly from the Firefox mobile site (www 
Predictably, the new version is pur- 
ported to be faster than earlier ver- 
sions, and it also sports better stability, 
more efficient memory, zooming capa- 
bilities, and fixes for some reported 
keyboard bugs. Other features include 
Firefox Sync, which is designed to 
synchronize history, bookmarks, and 
more between the desktop and mobile 
version of Firefox 4 Beta across mul- 
tiple devices, and more items in the 
add-on gallery for increased custom- 
ization possibilities. 

Why ,mobi? 


At, you can look up WHOIS information 
for any site with the .MOBI file extension. 

Intel Sticking With MeeGo 

Development of the open-source 
mobile operating platform MeeGo has 
been a joint effort between Nokia and 
Intel, until recently. Nokia rocked the 
boat by announcing it was planning to 
adopt Windows Phone 7 as its primary 
- smartphone operating system. 
The announcement was more of a blow to the 
future of Nokia's Symbian platform than MeeGo, 
but it still leaves the future of the latter somewhat 
tenuous. It appears as though MeeGo still figures 
into Nokia's long-term mobile strategy, but Intel 
is more clearly sticking with the platform, recently 
unveiling a tablet user experience and stating that 
it will continue to develop the platform for every- 
thing from tablets to phones to automobiles. 

Windows Phone 7 Marketplace Surpasses 
10,000 Applications 

The Windows Phone Marketplace, renovated for 
and bolstered by the relatively recent release of Win- 
dows Phone 7, has now topped 10,000 apps. More are 
coming, to the tune of a few hundred each week. New 
apps being added to the Marketplace include apps that 
have become popular on other mobile platforms, such 
as Flickr and Angry Birds, in addition to platform-spe- 
cific treats such as games that integrate with Xbox Live. 

Quickly & Easily Find WHOIS Info 

Every Web site has "WHOIS" information, which 
includes details about a domain, including the 
site's IP address and information about the owner 
of the domain 
name. There is 
now a site (whoiz 
.mobi) that lets 
you quickly and 
easily look up 
WHOIS infor- 
mation about 
Web sites with 
the .MOBI file 
extension — in 
other words, mo- 
bile Web sites. 
Simply enter the 
domain you're 
looking for in 
the text field, tap 
the Whoiz It? 
button, and the 
WHOIS infor- 
mation appears 
directly below. 

HTML5Test is a site that lets you test your Web browser 
to see how well its makers are implementing the various 
aspects of the upcoming HTML5 specification. 

58 April 2011 / 



iPod » 

3:19 PM 

Google Web Images I Places more ▼ f> 

» pizza lincoln ne 


Places near: Lincoln, NE ▼ 

Places > pizza lincoln ne 

Show only businesses open now . 

Domino's Pizza 
2815 South 18th Street 
Lincoln, NE 
*"£*** 6 reviews 

(402) 434-2388 


HTML5 Test Site 

The developing but not-yet-released HTML5 
specification promises to deliver a variety of 
new capabilities for the Web; already, many sites 
and designers are experimenting with various 
aspects of HTML5. HTML5 implementation on 
Web browsers is on its way, and thanks to www, you can easily check the level 
of your Web browser's compatibility. To run the 
test, you simply visit the Web site. 

You'll receive a score (out of a possible 400), 
and the site breaks down your browser's score 
by category. Categories include Parsing Rules, 

Canvas, Au- 
dio, Video, 
Forms, and 
more. With- 
in each cate- 
gory, you can 
see the num- 
ber of points 
your brows- 
er scores. For 
your brows- 
er may net 15 
out of 20 
points in the 
Storage cat- 
egory. Under 
each score 
the site pro- 
vides more 
detailed in- 
- formation 
about how it determined each score and indicates 
which specific items were supported. For all its detail, 
HTML5Test isn't intended to be a comprehensive test, 
but it's a good indicator of how well your browser's 
manufacturer is keeping pace with the updated lan- 
guage of the Internet. 

Google Mobile Search "Open Now" Feature 

Google, for all its forays into mobile op- 
erating systems, cloud computing, and other 
technology fronts, hasn't forgotten about its 
bread and butter — search, or in this case, mo- 
bile search. The company recently unveiled the 
Open Now feature under the Places search tab, 
available only in the U.S., which not only turns 
up local businesses in search results but also lets 
you filter those results to display establishments 
that are open for business at that particular mo- 
ment. Google pulls data from a business' posted 

Papa John's Pizza 
623 N 48TH ST 
1 review 


Google mobile's new Open Now feature lets users 
filter Places searches for local businesses by the hours 
they're currently open. 

hours. This new feature is especially useful for 
those times when you need something at an odd 
hour, such as very late in the evening or early in 
the morning. You also can filter Google mobile 
search results by their star ratings and distance. 

Priority Inbox For Gmail Mobile 

In other Google-related mobile news, Gmail 
for mobile now has a Priority Inbox feature. The 
screen real estate on mobile devices is limited 
by nature, so anything that makes better use of 
what's on-screen helps the user experience. You 
can set up Priority Inbox in the desktop ver- 
sion of Gmail — you can't adjust the settings via 
the mobile interface just yet — and when you 
access Gmail from your mobile device, the pro- 
gram will list your high-prioritized messages 
at the top, including unread messages and 
starred messages. 

Network Solutions & dotMobi Partnership 

As more and more consumers and business 
professionals rely on their mobile devices to ac- 
cess the Internet, having a mobile-optimized ver- 
sion of your company's Web site is imperative. In 
some cases, instead of trying to shrink an exist- 
ing site down to fit logically on a mobile device's 
small display, it may be bet- 
ter to simply create a sepa- 
rate, stripped-down mobile 
site that features just the 
essentials of who you are, 
what you provide, and how 
to contact you. 

At least, that's the approach 
Network Solutions (, in con- 
junction with mobile content 
provider dotMobi (, 
has taken with goMobi. go- 
Mobi provides businesses with 
a simple and fast way to pro- 
duce a mobile Web site, with 
packages that start at $5.99 
per month. 

During setup, goMobi 
pulls data from your existing 
site, such as your company 

o P ' goMobi, from Network Solutions and dotMobi, is a service that lets 

though you can manually businesses put together a mobile Web site quickly and easily, 
enter as much new or dif- ~ 

Mobile Websites 
Features a Benefits 

A 4 QHttKEBvhUp (— | 

At|r«trv t , Eny .tt'tfivigri* W 



"flW»-F» w"dlj FHhim Is Hiiaui 

ferent information as you like. The resulting site 
is simple and clean, and it offers customers easy 
links to your company's hours, contact informa- 
tion, and more. ▲ 

PC Today/ April 2011 59 




by Blaine Flamig 

The iPad 2 Is Upon Us 

■ With Steve Jobs on hand, Apple introduced the second coming 
of the iPad in early March, presenting Wi-Fi-only 16GB ($499), 
32GB ($599), and 64GB ($699) iPad 2 models and Wi-Fi + 3G iPad 
2 models in the same capacities at sug- 
gested $629, $729, and $829 
price points, re- 
spectively. (The 
price for the 
original iPad now 

falls to $399.) Running on the new iOS 4.3 — with new features in- 
cluding support for establishing a "Personal Hotspot" by tapping 
into an iPhone 4's cellular data connection) — the iPad 2 is available 
on AT&T and Verizon networks, comes in black and white, and 

gains dual cameras (front-facing VGA and back-located 720p HD) 
for FaceTime chatting. The first-gen iPad's 9.7-inch LED screen is a 
holdover, but the iPad 2 weighs in 15% lighter and measures 33% 
thinner. The tablet also promises to be faster and a better graphics 
performer thanks to its dual-core A5 processor. 

Of course, accompanying 
any new Apple devices are 

SRS Labs' iWOW 3D Restoration Project 

■ Most earbuds that ship with audio-playing 
mobile devices are, well, junk in terms of 
the tinny, hollow audio quality they produce. 
Hence, the profitable business that is third-party 
headphones and earbuds. Still, even good third- 
party cans don't deliver all the full-powered, dy- 
namic details an audio track is recorded with. SRS 
Labs' ( iWOW 3D adapter aims 
to alter this reality by using patented technologies to 
gift ears with "natural and immersive sound" featur- 
ing "deep, rich bass" by restoring details in digital audio that's often 
overshadowed or lost entirely. Available for any 30-pin connecting Apple 
device including iPads, iPhones, and iPods, the iWOW 3D works with any 
standard headphones or earbuds. Just press the adapter's integrated button, and 
the iWOW 3D goes to work producing simulated 3D audio. A free SRS iWOW App, 
meanwhile, enables configuring audio for various modes (headphones, speakers, 
car, etc.). The adapter is available with headphones ($79.99) or without ($59.99). 

new accessories. For the iPad 2 
that means Apple's own mag- 
netic Smart Cover ($39 poly- 
urethane; $69 leather), which 
comes in 10 colors, offers a pro- 
tective screen, and doubles as a 
video and keyboard stand. The 
cover also puts the iPad 2 into 
sleep mode when closed and 
wakes the tablet when opened. 
A Digital AV Adapter ($39), 
meanwhile, takes advantage 
of the iPad 2's video mirror- 
ing abilities to display active 
content on the iPad 2's screen 
on an HDTV. Elsewhere, Belkin 
( announced 
the multiple-angling FlipBlade 
Adjust ($29.99), beanbag-based 
ViewLounge ($29.99), and the 
Folio Stands line (pricing still 

60 April 2011 / 



Samsung PMPs Cozy Up To Wi-Fi 

■ Samsung recently offered details for its upcoming Galaxy S WiFi 4.0 and 
WiFi 5.0, would-be iPod touch killers that by all appearances look to be 
essentially Galaxy S smartphones without cellular ability. Although official 
pricing and release information are still to come, early information indicates 
the WiFi 4.0 will sport a 4-inch Super LCD touchscreen display with 720p 
support while the 5.0 will possess a 5-inch LCD screen. The WiFi 4.0 will 
come in 8GB, 16GB, and 32GB sizes, and the 5.0 will have 16GB and 32GB 
options, but both players will reportedly integrate Bluetooth; run on Android 
Froyo; preload Skype and Qik for video and voice calling and chatting; use 
Samsung's SoundAlive audio-enhancing technology; offer support for the 
Android Market and 
Google apps; and don 
dual cameras, HDMI 
ports, microSD card 
slots, and 1.3W exter- 
nal speakers. Audio 
and video codec sup- 
port looks to include 
MPEG4, H264, DivX, 
Xvid, and WMV. 



Samsung GAL A XV,, 


HswrtA Om/jH mum* Swww 

3 . a 



to come), while Targus ( presented its 360° 
Rotating Stand & Case ($59.99), Vuscape Cover & Stand ($39.99), 
and form-fitting Protective TPU Skin ($24.99). Other early ac- 
cessories announced include iLuv Creative Technology's (www 
.i-luvcom) faux-leather Professional Case With Detachable Blue- 
tooth Keyboard ($129.99); Case-Mate's ( 
stately leather and nylon Versant ($49.99) case; 
and Booq's ( Booqpad 
iPad Agenda ($49.95 and $99.95) cases that hold 
your iPad 2 plus a notepad, pen, business cards, 
and more. 

Play Multimedia Files 
Anywhere With MiMedia 

■ Many online subscription backup ser- 
vices will gladly store your music, photos, 
videos, and other files in the cloud. Mi- 
Media (, however, 
puts a spin on backup services by of- 
fering to help bypass what can be the 
time-consuming process of uploading 
hundreds of files during the initial back- 
up routine via broadband connection. In 
short, MiMedia will send its free Shuttle 
Drive, which is an external USB drive, 
to you in the mail that you can transfer 
files to. This is a much faster transfer 
method vs. uploading via broadband. 
When you're done, send the Shuttle 
Drive back, and MiMedia will transfer 
the files to its data servers. (You'll need 
to provide a credit card number as secu- 
rity to receive a Shuttle Drive, which you 
can only use for backup purposes.) Once 
in the cloud, you can play your music 
and video files, view photos, and access 
other files (support for contacts is com- 
ing) from any Web-connected device, in- 
cluding iPhones and iPads via a free app. 
Backing up data from unlimited devices (including external and 
networked drives) is supported, as is sharing files. Further, after 
the initial backup, file changes and additions sync automatically 
via your broadband connection. Plans include 25GB ($5 per month 
or $49 per year), 100GB ($10 per month or $99 per year), and 250GB 
($20 per month or $195 per year) options. A 

Plug In Launcher Saves A Step 

PlayOn Brings Mobile Magic To 
Android Devices 

■ Another tasty Android app worth consideration 
is PlayOn's ( PlayOn Mobile for 
Android (free), which enables viewing content 
from Netflix, Hulu, Comedy Central, CNN, CBS, 
ESPN, SpikeTV, PBS, and other channels on An- 
droid devices running 2.2 or higher via Wi-Fi or 
3G. Previously available for the iPhone and iPad, 
PlayOn Mobile requires having a PlayOn subscrip- 
tion ($39.99 the first year; $19.99 thereafter) and in- 
stalling accompanying server software to your PC. 
Afterward, you can start streaming content to your 
mobile device, while at home you can stream Play- 
On content to a television using a Wii, Playstation 3, 
Xbox 360, or other compatible device. 

■ In the big scheme of things, Plug In Launcher, an app freely available in 
the Android Market, isn't going to radically change your life. If you regu- 
larly listen to music on a mobile device that uses Android 2.1 or higher, how- 
ever, it will offer a dose of convenience. Operating as a background service, 
Plug In Launcher essentially launches an app 
of your choice upon plugging headphones 
into your device. Thus, if your routine on the 
commute home is to slip on headphones, 
launch Pandora, and listen to tunes, Plug In 
Launcher eliminates having to launch Pan- 
dora. The app will also launch a designated 
app (an alarm clock, for example) upon plug- 
ging a cable into the USB /power port. Con- 
figuration options include launching Plug In 
Launcher after a reboot and displaying a dia- 
log box asking if you want to launch the app 
without interrupting a present task. 

PC Today/ April 2011 61 



Take Charge Of 
Your Network 

Powerline Networks Energize Your LAN 

by Marty Sems 


For a limited time only, 
try the Plaster Networks 
Starter Kit for yourself for 
only $129. 90 ($25 off) 
plus free ground ship- 
ping. Visit www.plaster 1 . 

It seems as though you can go online these days 
with almost any electronic gadget. Some, such 
as HDTVs, Blu-ray Disc players, computers, 
tablets, and game consoles, can stream video over 
the Internet, even in high definition. (That is, as- 
suming you have a decent broadband connection.) 

Internet TV at home is one rising force; serving 
up multimedia presentations to prospective cus- 
tomers is another. If your employees are able to 
stream a variety of HD video clips from a central- 
ized media server or NAS on your network, they 
can impress potential clients with professional- 
looking pitches without burdening their local hard 
drives with bulky files. 

The trouble, of course, is that your home or 
small-office network may not be ready for the 
HD world. Wi-Fi is commonly used because it's 
easy to deploy, but in many cases, it's not ideal for 
streaming video in a reliable way. 

Plaster Networks CEO Jeff Scroggin 
says, "We're making it easier to con- 
nect your devices to the network. In 
most cases, [our customers] are using 
powerline because Wi-Fi does not give 
them a connection that is fast enough 
or reliable enough. Powerline adapters 
provide an easy and fast way to Install' 
an Ethernet port by simply plugging 
(an) adapter into an outlet." 

"Also, Wi-Fi, in many cases, does not reach to 
every room in the home. Stone or brick walls, walls 
with metal studs, or plaster walls embedded with 
chicken wire (for strength) can all significantly 
block the Wi-Fi radio signal." 

Ethernet cable, in comparison, is simple and 
foolproof — but you'll spend time and effort 
routing each new cable under rugs and base- 
boards to keep it from becoming an eyesore or 
tripping hazard. 

Hence the usual lament that your home or 
small office isn't prewired for networking with 
multiple cables to every room. But actually, it is. 

Your building or house is already wired for 
powerline networking. A powerline network 
sends data over the same copper wiring that 
carries power to your devices and appliances. It 
may sound risky at first blush, but a powerline 
network can do this without endangering your 
delicate electronic devices. Put into mar- 
keting terms, it's a value-add for your 
existing electrical wiring. 

"Wi-Fi is inherently unreliable because of noise 
from all sorts of devices in the home that generate 
an RF signal," such as microwave ovens, cordless 
phones, and baby monitors, says Plaster Networks 
( CEO Jeff Scroggin. 

Networking With Power 

With a powerline network, you can 
turn any AC outlet into a network port. 
This gives you the freedom to put com- 
puters, HDTVs, and other Internet- 
capable devices anywhere you need. 
Your office layout won't be limited by 
the availability of Ethernet connections. 
Nor will you need to move your elec- 
tronics to catch the best Wi-Fi coverage 
and avoid dead spots. 

A powerline setup is as reliable, signal- 
wise, as Ethernet. And current powerline 
equipment is more than fast enough to 

carry HD video, to say nothing of lesser burdens 

such as music and data files. 

Most adapters sold today are rated at 200Mbps 

(HomePlug AV) or even 500Mbps, albeit over 

shorter physical distances. The upcoming 

62 April 2011 / 



You can add adapters 

to grow your powerline 

network as you need to 

without laying a single 

cable or worrying 

about gaps in your 

wireless coverage. 

(Diagram courtesy of 

Plaster Networks.) 

HomePlug AV2 stan- 
dard is expected to 
support 500Mbps 
or more. Of course, 
as you may already 
know from using 
Wi-Fi or Ethernet, ac- 
tual data throughput 
is significantly less 
than these theoret- 
ical figures imply. 
(Also, if you plan to 
stream video from 
online sources, it's up 

to your broadband provider to ensure that your 
Internet connection is up to snuff.) 

To use a powerline network to link a device to 
your router, you'll need a pair of adapters. These 
boxy-looking gizmos are designed to plug directly 
into an AC outlet. Put one near your network router 
and another near your HDTV or other device. 

Next, run a short Ethernet cable (usually in- 
cluded) between the router and its powerline 
adapter. Do the same with the television or other 
device, and then you have an instant link. Think of 
it as using your in-wall copper wiring as an exten- 
sion cord between networkable devices, with the 
adapters acting as interfaces on each end. 

Beware that the powerline setup doesn't inter- 
fere with existing Ethernet or Wi-Fi connections on 
your network. All of these technologies can hap- 
pily coexist. And you won't have to worry about 
neighbors eavesdropping on your network with 
their own powerline adapters once you change the 
default encryption key. 

How To Buy 

Although you'll need at least two adapters to 
make a first-time powerline network, you can buy 
more adapters to support more devices around 
your home or office. If you mix model numbers 
and /or brands, make sure they're all compatible 
with the same standard, such as HomePlug AV, for 
best results. 

As you shop, you'll notice that the cost of pow- 
erline adapters — 200Mbps+ units start at about 

$55 each online — is higher than 802.1 In cards or 
typical lengths of Ethernet cable. And laptops 
already come with wireless adapters from the fac- 
tory, just as most routers come with built-in Wi-Fi 
access points. 

That said, for reaching wireless dead spots with 
HD-capable speed, there's no easier or more flex- 
ible alternative to a powerline network. If you need 
to rearrange your small office to accommodate a 
new employee, no problem: Simply move or add 
adapters as needed. 

Note that not all powerline adapters are cre- 
ated equal. Some come with two or more Ether- 
net ports, for example. Also, some adapters 
incorporate active technologies to improve per- 
formance. One example is Plaster Networks' 
PLN3 ($89.95). It uses a dedicated processor 
to sense the current conditions on the network 
and then optimize the throughput of all of the 
adapters. You only need one PLN3 on your net- 
work to benefit it, Plaster Networks says. The unit 
is also compatible with HomePlug AV adapters 
from other manufacturers. 

Also, Scroggin says, "through Plaster Net- 
works Service, we automatically upgrade our 
customers' adapters [over the Web, with no 
action required on their part] with the most 
recent HomePlug AV firmware when new re- 
leases come out. As a result, we help protect 
their investment in hardware, so they contin- 
ue to get the best performance as the technol- 
ogy improves." ▲ 


Plaster Networks sells a 
powerline networking 
starter kit with an 
AV200 and a PLN3 
adapter for $129.90. 

Plaster Networks' 1X2 
Isolator ($24.95) can pro- 
tect a powerline network 
from interference that can 
hurt data transfer speeds. 

PC Today/ April 2011 63 



Photo Printers vs. 
Ordering Prints Online 

What's The Better Option? 

by Nathan Lake 

If you need to print your digital photos, there 
are two easy ways to get them. You can in- 
vest in a photo printer and produce the prints 
yourself, or you can upload the photos to an online 
photo printing service and have them delivered 
to you. Many photo printing services also work 
with local photo developers, such as Walgreens 
or Target, to let you pick up your photos the same 
day. We examine the costs associated with printing 
the photos for both methods so you can determine 
which printing model works best for you. 

Shutterfly*° My5h U ft e rfly My picture 

Add pictures Share online 

My Shutterfly 

■;;!•:;::';;' c"-;e-? :2-.-. -"■;■■'; '::::iS--2=. 
Search \& > J 

My recent albums 







iew all albums » 

Sacramento & San 

New Years 


My projects 

It's easy to ere;. azing with your 

pictures in award-winning photo books, cards, 
stationery and photo gifts. 

Start a new project 

Photo Books 
Cards & Stationery 
Prints Si Posters 
Photo Gifts 
More in the store 

My shared pictures, videos and projects 

Sample site 

My Share sites 




and get 30 FREE printi 
Limited time offer 

View my Share si 

I Claim your prints] 

Post your photo book 

Post your photo book in the Shutterfly Gallery 
and get feedback and support from a group of 
people passionate about sharing m 

Shutterfly Gallery 

Shutterfly Gallery is a 

wonderful place to find 

inspiration and connect 

with fellow Shutterfly 


View Shutterfly Gallery 

Shutterfly offers you 

the ability store, share, 

and order prints of your 

digital images. 

Cost Efficiency 

Based on print costs, purchasing 4x6s or 5x7s 
from an online service is typically less expensive 
than using a photo printer to do the job. A recent 

study from Quality Logic found that the cost of ink 
per page for recent photo printers was anywhere 
from 11 cents to 41 cents per 4x6 borderless print. 
Note that the ink per page cost did not include 
photo paper, which would further raise the cost for 
each print. Most of the printers in the study hov- 
ered around the 30-cent mark per 4x6 print. 

If you examine the "Costs For Online Photo 
Printing Services" sidebar, you can see that a 4x6 
print will cost you less than 15 cents (ink and 
photo paper together). However, that price does 
not include shipping costs. If you're printing a 
small amount of photos, say, fewer than 50, the 
shipping costs could come to 10 cents per photo. 
For larger orders, such as print jobs that exceed 
$25, we found that many online photo printing ser- 
vices eliminate shipping charges. You can also get 
around shipping costs by requesting the service 
send your prints for processing to a nearby photo 
developer. We should note that items picked up at 
a local developer may cost slightly more, however, 
because you'll have to pay the local sales tax and 
possibly an in-store pick-up fee. 

When odering prints larger than 5x7s, the cost 
scales begin to tip in favor of photo printers. A re- 
cent study from the Red River Catalog found that 
ink costs for an 8x10 print run about 60 cents to 80 
cents. If you invest in standard-quality photo paper, 
you'll add around 30 cents to 40 cents per print to 
your bill, which translates to a cost of around $1 per 
8x10 print. Online print services currently charge 
anywhere from $2.99 to $3.99 per 8x10 print. You'll 
save even more money with a photo printer when 
you print 8x10s or larger prints. 

Depending on the quality of photo you're 
looking for, you may also need to factor in the 
amount you're willing to spend on a photo 
printer. Today's high-end photo printers, which 
cost anywhere between $300 and $900, offer 
results that rival professional lab quality. The 
high-end photo printers are typically capable of 

64 April 2011 / 



Costs For Online Photo Printing Services 

Print Sizes 


S butterfly 



Print Center 






$0.13 fl 













i * ^J3 


handling prints as large as 13x19. Many photo 
printers in the $80 to $200 range provide ade- 
quate color depth and detail for any photo album 
or scrapbook, but photo printers are typically 
limited to prints as large as 8.5x11. 

We found that most online photo printing 
services are capable of enlarging your photos to 
20x30 prints. Other common poster-size options 
include 11x14 and 16x20. Pricing for the poster- 
size prints varies by the service, but you'll typi- 
cally pay around $8 for an 11x14, $16 for a 16x20, 
and $22 for a 20x30. Most printing services offer a 
variety of mailing options, including standard pri- 
ority, two-day, and overnight. For fastest delivery, 
several online printing vendors provide local pick- 
up. For example, Shutterfly ( 
allows for in-store pickups of 4x6 prints from Target, 
Walgreens, and CVS (CVS limits print orders to $60 
or less). The price for 4x6 prints rises to 19 cents per 
print with Shutterfly' s in-store pickup. Snapfish 
( allows for in-store pickup of 
photos up to 8x10s at Walgreens, Walmart, Meijer, 
and DUANEreade locations. Some stores can also 
produce photo-based gifts, such as photo cards, cal- 
endars, and books. 

Online Photo Printing Benefits 

If you regularly print photos with your photo 
printer, the process can be time consuming, be- 
cause you'll need to ensure that printer is correctly 
configured for the type and size of paper you're 
using. You'll also need to maintain the printer by 
monitoring and replacing the ink cartridges and 
paper as needed. With a photo printing service, 
all you'll need to do is upload the images, select 
the print sizes you want, and wait for the order 
to come to you or pick it up at the store. Most 
online photo printing services, such as Shutterfly 
or Snapfish, also let you share your photos with 
others online or store your images online. 

Advantages Of Using A Photo Printer 

Many consumers choose to go the photo printer 
route because they have ultimate control over the 

The WorkForce 840 
from Epson is an 
all-in-one printer that 
also provides photo 
quality prints. 

final print. For example, let's 
say that you have an image of a 
product your company produces, 
and you want to frame and hang an 8x10 photo of 
that product in your offices. With an online photo 
printing service, the photo you get back will look 
the way you sent the image in. But if you decide 
after you see the photo that you'd like to change 
the image's color, or crop it a different way, you'll 
need to go through the entire upload and waiting 
process all over again. With a photo printer, you 
can print the second copy right away. You'll also be 
able to adjust the printer's quality or color balance 
until the resulting photograph looks exactly the 
way you want. 

Choosing A Photo Printer 

If you think a photo printer is your best op- 
tion, there are a few key aspects you'll want 
to consider. There are a number of all-in-one 
printers that deliver more than acceptable photo 
quality and function well as all-around of- 
fice printers. For instance, Epson's WorkForce 
840 ($299.99; is a wireless 
printer that includes capabilities for scanning 
and copying, and it also features an automatic 

If you think a photo printer is your 
best option, there are a few key 
aspects you'll want to consider . . . 

duplexer for two-sided printing. For results that 
truly match professional-quality photo labs, you 
can invest in a photo printer that offers more than 
five ink colors, which give the printer the ability 
to produce photos with true-to-life color detail. 
For example, Canon's PIXMA Pro9000 Mark II 
($499.99; uses eight ink 
colors and can handle photo paper sizes up to 
13x19 inches. A 

PC Today/ April 2011 65 




Solve Remote 


Connection Problems 

Resolving remote network issues often goes beyond common 
fixes you may have used to fix your Internet connection. 

Fortunately, you can quickly eliminate a number of possibilities using a CLI (command-line inter- 
face; a text-based command window that is a holdover from the early days of computing), which 
is still available in Windows XP /Vista/ 7. 

All these suggestions assume that the network is up and operating. It also assumes you are 
connected to the Internet. Before you proceed, you'll need to know how to open the CLI window. 
In WinXP, click Start, select Run, type CMD in the Open field, and press ENTER. In Vista/Win7, 
click the Start button and type CMD into the Start Search field, and then click the CMD icon that 
appears in the results. 

Ping It 

All Internet or network hosts, com- 
puters, routers, and other Internet-enabled 
devices use an IP address (which is a 
string of four groups of numbers sepa- 
rated by periods, such as to 
uniquely identify themselves. You may 
have used this number to access a net- 
work login. This can also be a Web ad- 
dress (called a host name) or DNS name 
to access a login. IP addresses and DNS 
names are interchangeable. With either, 
a ping command can determine whether 
the computer and network can exchange 
basic data. 

From the command line window, type 
ping followed by a space and the IP ad- 
dress or DNS name (examples would be 
ping or ping www. corporate Press ENTER. If you see a 
time-out message, wait a few seconds. A 
time-out alert appears if the reply takes 
longer than a second. 

If the response indicates the data packets 
were sent and received, your machine is 

exchanging data with the network address. 
You can skip to "Get Connected" to set up 
a dedicated connection and edit settings. If 
you have been accessing the site via a Web 
address, go to "Look It Up" before heading 
to "Get Connected." 

If you receive a response that contains 
something about a nonexistent domain, 
you are likely using the wrong IP address 
or DNS name to log in. Double-check the 
address and try to connect normally. (If 
you are logging in with an IP address, skip 
to "Look It Up" for a quick way to check 
its validity.) 

If you receive a transmission error, 
then the ping data is not leaving your PC. 
Your firewall is likely blocking you from 
accessing the network. You will want to 
add the site to your firewall as an allowed 
exception (refer to your firewall's help 
documentation for these instructions) and 
try again. 

If you receive a response after an exces- 
sive number of time-outs, the network's 
response to your connection may be slow 

66 April 2011 / 



and your browser or other network access 
utility may be giving up before it connects. Length- 
en the response time by adding a -t switch (ping 
-t followed by the IP address or DNS name). 
This will ping the address indefinitely. After 
a dozen pings, press CTRL-Break to view the 
packet data. If there is no response yet, continue 
awhile longer, and then press CTRL-C. If you never 
get a response or the number of pings to get a 
response is considerable, skip to 'Trace the Route" 
for assistance. 

If you get a message saying the ping request 
could not find the host or the response indicates 
the number of data packets sent is zero, the net- 
work is not acknowledging your ping. Changes 
to the network or configuration may now be 
preventing access. Contact the network adminis- 
trator for further assistance. 

Look It Up 

You can look up a DNS name from an IP ad- 
dress and vice versa. From the command line 
window, type nslookup followed by a space 
and either the DNS name or the IP address and 
press ENTER. 

Write down the DNS name and numeric se- 
quence you see in the lines that begin with 
Name: and Address: (ignore aliases). If you are 
checking an IP address, the DNS name should 
help confirm it. If you recognize nothing, con- 
tact the network administrator to confirm the 
IP address. 

If you are using a DNS name, Windows may 
be having a problem with DNS name resolution 
(translating the DNS name into an IP address). 
Perform two pings from the same command line 
window, first using the DNS name you wrote 
down and then using the IP address. Compare 
the access times and packets you sent and re- 
ceived. If there is a big difference in behaviors 
pinging the DNS name vs. the IP address, skip to 
"Get Connected." 

Trace The Route 

Tracing the path data packets take going 
to the network will help pinpoint problems. 
From the command line window, type tracert 
followed by a space and the DNS name or IP 
address, and press ENTER. Lines will appear 
with access times and IP addresses. The final 
few hops should show domain names — the 
last one being your network. This is the route — 
and the time the trip is taking — between nodes 
on the Internet. 

If an early hop takes a long time or causes 
the trace to hang (a flood of timeouts), contact 
your ISP. If you reach many hops before things 
go awry, the problem may be with a gateway 
or router at or near the location of the remote 
network. Check with the network administrator 
for assistance. 

Get Connected 

Setting up a direct VPN connection gives 
you a dedicated login interface and lets you 
avert DNS issues. 

To set up the connection in WinXP, se- 
lect Control Panel on the Start menu. Click 
Network And Internet Connections and then 
select Create A Connection To The Network At 
Your Workplace. In Vista/Win7, click Control 
Panel on the Start menu and click Network And 
Internet (in Category view), then Network And 
Sharing Center. Click Set Up A Connection Or 
Network (Vista) or Set Up A New Connection Or 
Network under Change Your Network Settings 
(Win7). Select Connect To A Workplace, then 
Use My Internet Connection. (Vista /Win7 offers 
smart card as a connection option. We won't dis- 
cuss that here.) 

Select Virtual Private Network Connection, 
name the connection, and provide the host (DNS) 
name or IP address. If you are asked if you 
would like to dial a connection, click No (unless 
you only have dial-up Internet) and click Finish 
(WinXP) or Connect (Vista/Win7). The OS will 
attempt to connect you without configuring 
any settings. If this solution does not work, or 
if you are using WinXP, proceed with the fol- 
lowing instructions. 

Return to the Network Connections window 
in WinXP or the Network and Sharing Center in 
Vista/Win7 and click the option to manage net- 
work connections. Right-click your VPN network 
icon and select Properties. Next, click the Net- 
working tab, click Internet Protocol (in Vista/ 
Win7, you will need to do this for TCP/IP V4 
and TCP/IP V6), and then click Properties. Over- 
ride automatic configuration and provide the 
exact IP address and DNS names for the net- 
work. Exit the Properties interface, right-click the 
VPN icon, and click Connect. Provide your login 
information if prompted. 

If you cannot connect, then Windows can pro- 
vide some assistance, but you may need more 
advanced configuration information. You will 
need to contact the network administrator for 
detailed information. ▲ 


packets but none are 
returned, it generally 

dows is experiencing DNS 

The point at which 
a route trace hangs cai 
help you determine 
where your request foi 
network attention is 
being disrupted. 

PC Today/ April 2011 67 


Use Wi-Fi 

Hotspots Wisely 

The scramble for companies to leverage Wi-Fi to boost bottom lines 

and customer loyalty has resulted in a confusing number of service configurations. Here's 
the rundown on some issues you will encounter — and also how to connect in the wisest man- 
ner possible. 

How To Protect Yourself 

The ugly fact is that someone with enough 
skills and determination can hack into any net- 
work, and all but the most secure, private con- 
nections can be hacked by someone of average 
skill and enough determination. Consequent- 
ly, the most important thing you can do to use 
Wi-Fi hotspots wisely is to lock down your 
data and system. 

We urge you not to surf without a firewall. 
If you do not have firewall software installed, 
turn on Windows' built-in firewall protection. 
Because many users have third-party firewall 
software, we won't detail these instructions 
here. You can locate available firewall pro- 
grams by browsing to windows. microsoft 
.com and searching under Firewall (your 
version of Windows). 

The next step is to secure your data. Win- 
dows Vista/ 7 give you the option of selecting a 
network profile (Home, Work, or Public) when 
you connect. Always select Public unless you 
trust the network and its members. Doing this 
prevents other computers on the network from 
discovering your PC and turns off the File And 
Printer Sharing feature. You can tweak any of 
these settings in the Network And Sharing Cen- 
ter: right-click the network icon (a monitor or 
series of bars, potentially with a red X or starburst 
on top) at the bottom right of your display. Select 
Network And Sharing Center in Vista; 
Open Network And Sharing Center in Win7. 

In WinXP, File And Printer Sharing is turned 
off by default unless you enabled it. To see if 

it is enabled, right-click the network (monitor) 
icon at the bottom right of your display and 
select Open Network Connections. Right-click 
the icon for your wireless device and click 
Properties. Under the General tab, deselect 
the File And Printer Sharing For Microsoft 
Networks checkbox to turn sharing off glob- 
ally. When you return to a safe environment, 
you can re-enable this feature when neces- 
sary. In Vista /Win 7, you can also turn off the 
File And Printer Sharing feature manually 
through the OS's Network Connection Prop- 
erties feature, but it's easier to let Windows 
do it for you. 

How To Connect 
Through Windows 

To connect to a wireless network, right-click 
the network icon and select View Available Wire- 
less Networks (WinXP) or Connect To A Network 
(Vista). In Win7, select the Network icon. 

A menu will pop up displaying available 
networks. Each OS will identify whether net- 
works are secure. If the network you want is 
open, select it and click Connect. We advise 
not connecting to an open network unless you 
know it is the one you seek. Hackers set up 
open networks with friendly sounding names 
hoping that unsuspecting individuals will hop 
onto them. 

If you are connecting to a secure network, 
or if you don't know the name of the net- 
work you want, contact the network host. 
You'll need the network name (also called a 



service set identifier or SSID) and, if the network 
is secure, a security key or passphrase. Select the 
desired network and provide the key if prompt- 
ed. (See the "How To Evaluate Security" section 
before you complete this step.) 

If you use WinXP, your network card may 
manage network connections, leaving you un- 
able to connect using our instructions. To give 
Windows control, click Start, select Control Pan- 
el, click Network And Internet Connections, and 
select Network Connections. Right-click your 
wireless connection and click Properties. Click 
the Network Settings tab and select the Use Win- 
dows To Configure My Wireless Network Set- 
tings checkbox. 

How To Set Up A Manual Connection 

If you cannot locate the network you want (be- 
cause some networks choose not to broadcast their 
SSIDs), you can set it up manually. In addition to 
the network, name, and credentials, you will need 
the network security protocol and encryption type 

To set up a manual connection in WinXP, open 
the available networks list as described previ- 
ously and click Advanced or Change Advanced 
Settings (depending on the service pack that you 
have installed). On the Wireless Networks tab, 
click Add. In Vista/Win7, open the Network And 
Sharing Center. In Vista, click Set Up A Connec- 
tion Or Network at the top left of the display; 
in Win7, click Set Up A New Connection Or Net- 
work (under Change Your Network Settings). Se- 
lect Manually Connect To A Wireless Network and 
click Next. 

Provide the information exactly as you were 
given it (uppercase and lowercase). In Vista /Win7, 
you can opt to see the characters as you type for 

▲ In Vista/Win7 the Network And Sharing Center is your 
portal to setting up new connections, changing network 
profiles, and more. 

confirmation. If the network is 
WEP and you do not see this 
option, select Shared. Select an 
encryption type if you have 
one. Otherwise, keep the de- 
fault. After entering all this in- 
formation and configuring the 
desired settings, click OK or 
Next to connect. 

How To Evaluate Security 

Most private, as well as 
some public, networks use 
one of several security standards to protect us- 
ers and themselves from intrusion. YouTl en- 
counter WEP, WPA, and possibly WPA2. The 
Wireless Network Connection dialog box may 
provide the network type. If not, here's a hint: 
WEP security keys always contain 26 charac- 
ters; WPA and WPA2 security keys are eight to 
63 characters in length. 

WEP is the least 
secure and easiest b^^^^^^^^^^^^^^h 
to crack; treat a 
WEP network as 
you would an un- 
secure network, 
setting its profile to 
Public unless you 
absolutely must 
communicate with 
other PCs. WPA 
and WPA2 are 
more impervious 
to cracking, so you 

can use a profile that is more open, such as Work, 
if necessary (or tweak the settings in the Public 
profile to open things up as needed). 

Take Charge 

At the end of the day, the responsibility for 
protecting your assets lies with you. Using 
common Internet precautions is also a good idea. 
Before you provide sensitive information, be sure 
you are at a secure site. The Web address should 
begin with "https" instead of "http" and your 
browser should display a padlock icon or other 
security confirmation. Check with your email 
provider to see if you can encrypt your email 
messages. Another precaution you can take is to 
turn off your wireless adapter when you are not 
using the Internet. To turn wireless off, right- 
click the icon for your wireless connection in the 
System Tray and select Disable. ▲ 

PC Today/ April 2011 69 



Revive A Crashed 


Someday you will face the inevitable notebook failure. You'll 

be working diligently on the documents you need for your three o'clock meeting or 
be right in the middle of composing a lengthy email describing the highlights of your 
previous business trip, and your Windows notebook will freeze, suddenly shut down, 
or reboot itself. Or perhaps your Web browsing is halted by an unexpected blue screen 
bearing an ominously lengthy error message. 

Unfortunately, these common errors could be the result of several different issues, so 
it can be difficult to pinpoint the cause of a failure. But luckily there are also many com- 
mon solutions that often yield positive results. Next time your notebook experiences an 
error, remember these tips. 

Notebook With A Blue Screen 

The cryptic error message on a BSOD (blue 
screen of death) can make it difficult to de- 
termine the problem's origin. But the BSOD, 
also called a stop error, is actually a safeguard. 
When Windows detects a serious problem, it 
stops what it's doing and reverts to a blue 
screen to protect your OS from damage. Most 
often, Windows will display the error when 
there is a hardware issue or a conflict with de- 
vice drivers. It doesn't always mean serious 
trouble, but it slows you down; for example, 
an attached external hard drive left on before 
the notebook powered up may cause a blue 
screen at startup; you have to wait as Win- 
dows scans the external drive before complet- 
ing startup. 

Restarting the notebook will 
often solve the issue. However, 
if a BSOD error appears re- 
peatedly, write down the stop 
error message, such as "STOP: 
0x0000007E." This will tell you 
which error has occurred so 
you can investigate a solution 
at Microsoft Help And Support 


Spontaneous Reboot Or Shutdown 

Without warning, your notebook may re- 
boot itself or shut down completely. Although 
numerous issues could be the cause, there are 
three common possibilities. First, if you or 
your IT staff upgraded the hardware in your 
notebook, some components may be incompat- 
ible, causing the system to shut down to avoid 
damage. You or your IT staff may try remov- 
ing or replacing a newly installed component 
to see if the shutdown error persists. If you are 
certain that the failure is not hardware-related, 
check to make sure that the air intake fans are 
not impeded. Blocked fans decrease the amount 
of cool airflow into your notebook, and if the 
computer gets too hot, it will shut itself down 
as a precautionary measure to 
prevent component damage. 

Automatic reboots or shut- 
downs could also be the result 


▲ With the Task Manager in 
Windows, you can determine 
which programs and processes 
are running and sometimes spot 
potential problems. 

70 April 2011 / 



▲ Use the Add And Remove Programs 
feature to get rid of a problem program. 

Remc e 

Add New 





Set Program 

Access a-id 

of a virus. If you have an antivirus 
program installed on your notebook, 
make sure it is up-to-date and then 
run a full scan of the hard drive. If 
you don't have an antivirus program, 
buy one or download a free program 
such as AVG Anti- Virus Free (free.avg 
.com). Once your antivirus program is 
ready to go, run a full scan to search for 
any malware. When the scan is com- 
plete, follow the program's instruc- 
tions to remove or quarantine any 
discovered malware. 

Frozen Notebook 

You're undoubtedly familiar with this scenario: 
Things are going fine with your notebook when 
suddenly you can't switch between multiple appli- 
cations or a program hangs when you try to open it. 
The mouse and keyboard may or may not respond, 
and you usually have to restart the computer, which 
is an inconvenience that can turn into a disaster if 
you haven't saved your work. 

Freezes are often the result of memory overload. 
The memory in your notebook has a certain capac- 
ity, and if there are too many processes running si- 
multaneously, your notebook may freeze because it 
can't keep up. Malware is a common culprit in caus- 
ing freezes, and sometimes two programs in conflict 
with each other can freeze your computer, especially 
if the computer doesn't have sufficient processing 
power or memory. If the keyboard or mouse is re- 
sponsive, start troubleshooting by pressing CTRL- 
ALT-DELETE. Enter the Task Manager and end the 
program you believe may have caused the freeze 
(usually the last you attempted to open). A problem- 
atic application name may be labeled "not respond- 
ing," which helps you identify which program is 
causing the trouble. If the keyboard or mouse does 
not respond, you may have to perform a hard (aka 
cold) shutdown by holding down the power button 
for five to 10 seconds until your notebook turns off. 
When you start your notebook once again, chances 
are everything will run smoothly. 

If the freeze occurs each time you open a specific 
program, make sure you have installed any updates 
or patches that the program might need. If a pro- 
gram is out-of-date, it may cause your notebook to 
freeze each time you open it because it is incompat- 
ible with another program or the OS. If a specific 
program doesn't seem to be causing the problem, 

Currently installed programs: [~J show updates Sort by: Name 


, J Microsoft Compression Client Pack 1.0 for Windows >;P 


„ . Microsoft Dynamics CRM 4.0 for Mici sol f ice Out 



% Microsoft Office Professional 



EU Microsoft Office Professional Plus 2007 



i - ( J Microsoft User-Mode Driver Framework Feature Pack 1.0 

j.,1 Microsoft Visual C-i + 2005 Redistributable 



| Mozilla FirefoK (3.0.5) 


23. 32MB 

did here for support inforrnatioi 



Last Used On 


To remove this p > m r u > iputer, click Remove 


Fj MSXML 6 Service Pack 2 (KB954459) 



& QuarkXPress 7.31 


' I.00ME 


Quid Time 



$ Snaglt 8 



jtjJ Sony Digital Voice Editor 2 



<$ Symantec Endpoint Protection 



^ Thin! Pad Configuration 



ThinkPad Ea; E] Litil 


1.89MB [v 

Back To Normal 

try defragmenting your hard drive. Defragmenting 
combines fragmented files and cleans up your hard 
drive so that your notebook can access files faster. 
If it takes less effort to find and access files, your 
notebook will use a smaller amount of its memory 
capacity and thereby gain the ability to perform more 
actions simultaneously. If your notebook still suffers 
from regular freezes, notify your IT department; you 
may need to reinstall the OS. 

Inability To Shut Down 

The inability to turn off a notebook is often 
caused by a software (not hardware) error. A pro- 
gram may be unable to close, and because it's still 
running, Windows can't exit. If your notebook re- 
fuses to turn off each time you shut down, begin by 
determining which program might be causing the 
problem. Note any "end program" or "program not 
responding" messages or press CTRL- ALT-DELETE 
to check the Task Manager for programs running in 
the background. 

If you recently made a change to that program, 
make sure that updates aren't available for the pro- 
gram. Otherwise try System Restore to return your 
PC to the state it was in prior to the change. To do this 
in Windows 7, click Start, type system restore, click 
System Restore; in Windows Vista, click Start, Con- 
trol Panel, System And Maintenance, Backup And 
Restore Center, and Restore Computer; in Windows 
XP, click Start, All Programs, Accessories, System 
Tools, and System Restore. If the problem persists, 
you may have to remove the program. 

To uninstall a program in Vista, click Start, Con- 
trol Panel, and Uninstall A Program to get started; in 
WinXP, click Start, Control Panel, and choose Add Or 
Remove Programs. Locate the appropriate program 
in the list and choose Remove. Don't remove a pro- 
gram unless you have the executable file or the instal- 
lation discs on hand. ▲ 

PC Today/ April 2011 71 



Open That 

Compressed File 

Receiving a compressed file, especially when you're on the 

road, Can be a headache and a hassle. Compressed files, which are actu- 
ally single archives composed of one or more files, can substantially save on file size and 
transmission time compared to a standard file format. However, they require special 
software to unpack (uncompress). Most of us recognize and can open the .ZIP file format 
(we'll tell you how in case you don't know), but what if the file extension is something 
arcane? Archived file extensions now run the gamut from .ARC to .ZOO and can origi- 
nate not only from a compression utility but also from compression features inside a 
program. Fortunately, current tools can handle nearly anything you'd want to compress. 

Unzip It 

Windows XP, Vista, and 7 include a free 
utility that can unpack compressed files 
and display them in their original formats. 
WinXP/ Vista/ 7 users can right-click the file 
and select Extract All. The utility lets you 
choose where to place the extracted file 
and whether to open the folder and display 
its contents when the operation completes. 
If you are running an older version of Win- 
dows (Win2000 or earlier), you'll need a 
separate utility. 

Expand Your Horizons 

If a compressed file has a file extension 
other than .ZIP, it will require a compression 
utility to unpack it. Most compression/ 

decompression software can extract the 
original files from a dozen or more com- 
pressed formats. One such program that has 
been around for quite some time is WinZip 
($29.95 for the Standard edition, $49.95 for 
WinZip Pro; We also like 
WinRAR ($29;, especially 
if you also plan to compress files and send 
them out. (Both give free trials, so you can 
compare before you buy.) However, if you 
only need to unpack files, a free utility might 
suit your needs just as well. For example, 
IZArc ( opens more than four 
dozen archive types (more than many fee- 
based compression utilities), and you can 
configure it to run your virus scanner as you 
start unpacking the archive. ZipGenius 
( is another option, and 
it supports more than 20 file types. 

Offer An Extension 

Some OSes (notably Apple's OS) store 
the file-type information as a header inside 

▲ Built into Windows XP, Vista, and 7 is the 
ability to unpack files compressed using the 
ZIP file format. 

72 April 20lfl 




the file and don't require a file extension. Mac 
users sometimes use file extensions to make life 
easier for their Windows-loving friends, but 
it isn't necessary. If a file unpacks and has no 
file extension and you know what type of file it 
is, you can simply add the extension to the end 
of the filename. Turn Officemeeting into Office- 
meeting.jpg, and you will be good to go, assum- 
ing it is actually a JPG file. This plan will fail 
miserably if you provide the wrong extension, 
leaving you to query the sender. However, if you 
at least know the file type (video, digital photo, 
and so on), and there are a reasonable number of 
options, a little experimentation may take you a 
long way. For example, if you know Johnsbirth- 
day is a digital photo file, try JPG, .TIF, .EPS, 
and maybe even .GIF or .PNG file extensions. 
You should get there eventually. 

Compressed Or Not? 

If you can't find a program to decompress a 
file, and you are not certain it is an archive, then 
it might not be. There are many more file exten- 
sions than most of us will ever encounter. Many 
of these represent files from proprietary pro- 
grams not in common use. For example, the infor- 
mation needed to portray data spatially through 
a GIS (Geographic Information Systems) pro- 
gram often comes divided among a half-dozen 
or so files; these are usually zipped into a single 
archive for ease of transport (and because they are 
pretty useless alone). If you accidentally obtain 
one by itself, say an SHP (shapefile, which de- 
scribes geometric forms) file, you won't be able to 
do a darned thing with it unless you have its part- 
ner files (usually at least SHX [spatial index] and 
DBF [database] files). Fortunately, a quick search 
on Google will at least tell you what you have. 

Software Lockdown 

Are you on a corporate laptop or public 
computer where you cannot install software? 
Don't worry. You can install a compression 
utility on a USB drive and access it simply by 
inserting the drive into an open USB slot on 
any PC. IZArc2Go (free) is USB-based. Best 
of all, for people working from a public com- 
puter, the utility leaves behind no trace of your 
activities when you decide to move on. 

Can't Touch That 

Compressed archives originate from many 
programs and OSes. Consequently, just be- 
cause you can unpack a compressed program 

WinRAR Jr. theme 

Extract To Test 

^> ! _J D:\Projects\WinRAR 


....... ....■;; 

WinRAR Orbital theme 


Add Extract To Test 

S> j | £3 D:\P rojects\WinRAR 


WinRAR Smile theme version 1.00© by Volter's Icons, opera skins, isural 

doesn't mean your PC 
can open it. If you 
double-click an un- 
packed file that has 
a three-letter file ex- 
tension and Windows 
does not associate it 
with a particular pro- 
gram, Windows will 
ask if you want to 
search for a program 
online or tell it which 
program to use. With 
some file types, Win- 
dows does a decent 
job of determining 

what program created the file. It may actually 
lead you somewhere useful. If not, try searching 
Google for the file extension to see what pops 
up. If you can determine the file type (video, 
graphic, or document, for example), you may 
be able to convert the file to another similar 
but usable format. Zamzar ( 
supports an array of file types, and it is free. 
(But you should expect ads and pop-ups.) 
Media Convert (, al- 
though ad-supported, is free, as well. 

Extract To Test 

Keep It Small 

When size limitations or bandwidth restric- 
tions affect your ability to send large files, a 
compression utility can be your best friend. 
There are many available, but beware that most 
compression tools can create far fewer archive 
types than they can unpack. Some tools, in- 
cluding WinZip and WinRAR, can divide extra- 
large files and folders among multiple archives 
when you compress them. However, in some 
instances this is ideal for moving a group of 
large files through without having to compress 
each one individually. 

The most universally compatible option for 
sending compressed files when you are uncertain 
of the recipient's capacity is a SEA (self-extract- 
ing archive). SEAs don't require the recipient to 
have any other program on his machine because 
they contain applets that perform the unpacking 
internally. Some SEAs have the .EXE (executable) 
file extension. Many virus programs flag EXE 
files as troublemakers, and some companies and 
public locations won't let computer users down- 
load those files. If you send out an EXE file, 
make sure you alert the recipient that it is safe 
to open. ▲ 

PC Today/ April 2011 73 




Revive A Dead 


Emergency CPR Techniques 

What should you do when your smartphone decides to play dead? 

Resist the urge to throw it against the nearest wall and try one of these techniques instead. 

Soft Reset 

All phones have a soft reset function, which 
is similar to restarting your computer. Be- 
ware that performing a soft reset will cause 
you to lose any data that isn't saved, but you 
will retain information previously stored on 
your smartphone. 

T-Mobile Gl. With the Gl powered off, hold 
the Home and End keys simultaneously. When 
you see a triangle with an exclamation point, press 
the Home and Back keys. 

Android (Other). All remaining Android 
models use a simple power cycle to perform 
a soft reset. Just turn the phone off and then 
back on again. 

BlackBerry (QWERTY keyboard). Press 
and hold the ALT-CAP-Del key combination. 
The display goes black for a second and your 
BlackBerry resets. 

BlackBerry (SureType keyboard). Press the 
ALT-CAP and Right Shift-Del keys. When the 
screen goes blank, release the keys. 

BlackBerry (touchscreen). Turn the Black- 
Berry off and remove the battery for at least 30 
seconds. Reinstall the battery and turn the device 
back on. 

BlackBerry Storm, Storm2. Soft resets usu- 
ally involve pulling the battery, but you can 
also use the Soft Reset app that is available OTA 
(over the air). After you install the app, you must 
disable Compatibility Mode: Tap Options, Ad- 
vanced Options, and Applications; then tap the 
BlackBerry Menu button and highlight Disable 
Compatibility Mode. Now, launch Soft Reset and 
tap the Reset button. 

BlackBerry Torch. Press and hold ALT-Right 
Shift-Del keys. 

HTC FUZE, Touch Cruise, Touch Dia- 
mond. You'll want to insert the tip of the 
phone's stylus into the reset hole located on 
the bottom of the device. 

HTC HD2, Touch Pro, Touch Pro2. Use a 
small object, such as a toothpick or stylus, to 
press the reset button, which is located be- 
low the battery and SIM card slot. 

iPhone (all models). Press and hold the 
Sleep /Wake button on the top of the iPhone 
and the Home button. Continue to hold both 
buttons (approximately 10 seconds) until the 
display goes blank. You'll see the white Apple 
logo as the iPhone reboots. 

Nokia (all models). Power your phone off 
and remove the battery for 30 seconds. Rein- 
stall the battery and power the phone on. Al- 
ternately, you can enter the code *#7380# and 
select Yes. 

Palm Pre Plus. If the phone's menus are 
still active, select Device Info, choose Reset 
Options, and select Soft Reset. If the phone is 
locked up or frozen, hold the power button 
and cycle the ringer button on and off three 
times. If that doesn't work, press and hold the 
Orange, Sym, and R keys until the device re- 
boots. Turn the phone off, remove the battery 
for 10 seconds, reinstall the battery, and power 
the phone up. 

Windows Phone 7. Turn the phone off, and 
back on. Alternatively, you can remove the 
battery for 30 seconds, reinstall the battery, 
and turn the phone back on. 



All other smartphones. You can generally per- 
form a soft reset by powering the phone off and then 
on or removing the battery and replacing it after 
30 seconds. 

Hard Reset 

A hard reset is a last-ditch option that returns 
your phone to its factory settings, which means you 
will lose all data and any installed applications. Be- 
fore performing a hard reset, you will want to re- 
move the memory card from your phone; that way 
you can recover data from the card later. 

Android (all models with functioning menu 
systems). One of the following menu-based systems 
for performing a hard reset should work, depending 
on the phone and version of Android. 

Open the application menu. Tap Settings, SD 
Card & Phone Storage, and Factory Data Reset, and 
then follow the on-screen instructions. 

From the Home screen, tap Menu, Settings, Pri- 
vacy, and Factory Data Reset, and then follow the 
on-screen instructions. 

From the Home screen, tap Menu, Settings, Se- 
curity, and Factory Data Reset, and then follow the 
on-screen instructions. 

When the menu system isn't functional, the fol- 
lowing phone-specific options will be helpful for 
performing a hard reset. 

T-Mobile Gl. With the Gl powered off, press and 
hold the Home-End keys until you see a triangle 
with an exclamation point. Open the QWERTY key- 
board and press ALT-W. 

T-Mobile G2. With the G2 powered off, press 
and hold the Volume Down button while you tap 
the Power button. After the Android logo appears, 
release the Volume Down button. Press the Volume 
Down button again, select Clear Storage, and press 
the Power button. Press Volume Up to start the fac- 
tory reset. 

Motorola Droid. Turn the phone off. Press and 
hold the Power-X keys to force the phone into re- 
covery mode. Next, press and hold the Volume Up- 
Camera key to display the recovery menu. Select 
Wipe Data /Factory Reset from the menu, and then 
select Reboot Phone. 

BlackBerry (all models). Remove the battery and 
wait for about 30 seconds. Reinstall the battery and 
turn the phone on. 

HTC FUZE. With the device turned on, press 
and hold the Left and Right soft keys. While hold- 
ing the keys, use the stylus to press and hold the 
Reset button on the bottom of the device near the 
USB port. Text on the display will ask you to con- 
firm the reset. 

HTC HD2. With the device powered off, press 
and hold the Volume Up and Volume Down buttons. 
With the volume buttons depressed, press and release 
the End/Power button. When a warning message dis- 
plays, release the volume buttons. Next, press the Vol- 
ume Up button to perform the reset. Pressing any other 
button cancels the reset. 

HTC Touch Pro, Touch Pro2, Touch Diamond. 
With the device turned on, press and hold the Vol- 
ume Down and Enter buttons. While holding the 
keys, use the stylus to press the Reset button, lo- 
cated under the battery cover. Continue to hold the 
Volume Down and Enter keys until a warning mes- 
sage displays. Release the Volume Down and Enter 
keys, and then press the Volume Up key to reset the 
phone. Pressing any other button cancels the reset. 

iPhone (all models). From the Home screen, 
tap Settings, General, Reset, and Reset All Settings. 
This action resets all preferences but retains ap- 
plications and data. If that doesn't work, go to 
the Home screen and tap Settings, General, Reset, 
Erase All Content, and Settings. This will delete all 
data and applications and return the iPhone to fac- 
tory conditions. 

Nokia (all models). With your phone powered on 
or in standby mode, type *#7370# and select Yes when 
prompted. You may need your Lock Code for confir- 
mation. The default lock code is 12345. 

If your phone doesn't turn on, try pressing the 
On/Off button, *, and 3 simultaneously. 

Palm Pre Plus. Open Device Info, tap Reset Op- 
tions, and tap the Full Erase button. And then tap the 
Full Erase button a second time. 

Samsung Behold II. From the Home screen, tap 
Quick List; and then tap Settings, Reset Settings, 
and Master Reset. Next, enter your password and 
tap Yes. 

If the phone is frozen or won't turn on, turn the 
power off and remove the battery. Wait 30 seconds 
before you reinsert the battery. Press and hold the 
Volume Down, Send, and End buttons. Keep hold- 
ing the buttons down until a graphic appears on 
the display, and then press the Menu key to start 
the reset. 

Samsung Captivate, Epic 4G, Vibrant. Power off 
your phone and remove the battery. Wait 30 seconds 
and reinsert the battery. Press and hold the Volume 
Down button while pressing and releasing the Power 
button. Press the Volume Down button to select Clear 
Storage, and then press the Power button. Confirm 
the reset by pressing the Volume Up button. 

Windows Phone 7. Slide left and tap the arrow 
icon. Next, Tap Settings and select About, scroll to the 
bottom of the display, and tap Reset Your Phone. ▲ 

PC Today/ April 2011 75 



The Traveler's 

911 Directory 


Air Canada 

www. aircanada . com 
Information and reservations 

(888) 247-2262 
Baggage information 
) 689-2247 

American Airlines; 
Reservations (800) 433-7300 
TDD (800) 543-1586 
Eight information (800) 223-5436 
Baggage delayed less than five 

days (800) 535-5225 
Ticket refund requests 

(918) 254-3777 

British Airways (mobile) 
Information and reservations 
(800) 247-9297 

Continental Airlines 

ww w. continental .com 

Reservations to U.S. and Mexico 

destinations (800) 523-3273 
Reservations to international 

destinations (800) 231-0856 
TDD (800) 343-9195 
Flight information (800) 784-4444 
Baggage information 

(800) 335-2247 
OnePass frequent flyer 

assistance (713) 952-1630 

Delta Air Lines 
Reservations (800) 221-1212 
Flight information (800) 325-1999 
Baggage information 

(800) 325-8224 
SkyMiles members 

(800) 323-2323 

Frontier Airlines 

www. frontier airlines . com 
Reservations (800) 432-1359 
Customer relations (800) 265-5505 

JetBlue Airways 

(800) 538-2583 

Information and reservations 
(800) 399-5838 

Midwest Airlines 
Reservations (800) 452-2022 
TDD (800) 872-3608 

Southwest Airlines 

www. south west . com 
(800) 435-9792 
TDD (800) 533-1305 

Spirit Airlines 

(800) 772-7117 

US Airways 
Reservations to U.S. and Canada 

destinations (800) 428-4322 
Reservations to international 

destinations (800) 622-1015 
TDD (800) 245-2966 
Customer service (800) 943-5436 

United Airlines (mobile) 
Reservations (800) 864-8331 
International reservations 

(800) 538-2929 
TDD (800) 323-0170 



Advantage Rent A Car 
Reservations (866) 661-2722 or 

(210) 344-4712 outside the U.S. 
Customer service 

(800) 777-5524 

Alamo Rent A Car 

(800) 462-5266 
TDD (800) 522-9292 

Reservations (800) 331-1212 
TDD (800) 331-2323 
Customer service (800) 352-7900 

Budget Rent A Car System 
Reservations in the U.S. 

(800) 527-0700 
Reservations outside the U.S. 

(800) 472-3325 
TDD (800) 826-5510 
Roadside assistance (800) 354-2847 
Customer service (800) 214-6094 

76 April 2011 / 



Dollar Rent A Car 
Reservations (800) 800-3665 
Reservations outside the U.S. 

(800) 800-6000 
TDD (800) 232-3301 
24-hour roadside assistance 

(800) 235-9393 

Enterprise Rent-A-Car 

www. enterprise . com 
Reservations (800) 261-7331 
TDD (866) 534-9270 


Reservations (800) 654-3131 

Reservations outside the U.S. 

(800) 654-3001 
TDD (800) 654-2280 
Extend rental (800) 654-4174 
Billing information 

(800) 654-4173 
Customer relations 
I 777-6095 

National Car Rental 
(800) 227-7368 
TDD (800) 328-6323 

Payless Car Rental 
(800) 729-5377 

Thrifty Car Rental 
Reservations (800) 847-4389 
Emergency (877) 283-0898 




Roadside assistance 
(800) 222-4357 

(800) 397-3342 


(866) 468-9473 

OCS (Overseas Citizens 

Services) traveler's hotline 

(202) 647-5225 or 

After-hours emergencies 

(202) 647-4000 


mobile . orbitz . com 

) 656-4546 

(800) 774-2354 


) 872-8356 


Candlewood Suites 
mobile . candlewoodsuites. com 
) 226-3539 

Chase Suite Hotels 
(800) 966-3346 

Choice Hotels International 

(Cambria Suites, Comfort 
Inn, Comfort Suites, 
Quality Inn, Sleep Inn, 
Clarion, MainStay Suites, 
Suburban Extended Stay 
Hotel, Econo Lodge, and 
Rodeway Inn) 

www. choicehotels . com 

(877) 424-6423 

Courtyard Hotels 

www. courtyard .com 

) 236-2427 

Crowne Plaza Hotels & Resorts 

www. cro wneplaza. com 

mobile . cro wneplaza . com 
(877) 227-6963 

Doubletree Hotels 
(800) 222-8733 

Embassy Suites Hotels 
(800) 362-2779 

Four Seasons 
Hotels & Resorts 
(800) 819-5053 

Hampton Inn Hotels & Suites 
(800) 426-7866 

Hawthorn Suites 
(800) 527-1133 

Hilton Hotels 
(800) 445-8667 

Holiday Inn 
(888) 465-4329 

Holiday Inn Express 
(888) 465-4329 

Homewood Suites 

(800) 225-5466 

Hyatt Hotels & Resorts 
Hyatt Hotels & Resorts 

(888) 591-1234 
TDD (800) 228-9548 
Hyatt Place (888) 492-8847 

Hyatt Summerfield Suites 
(866) 974-9288 

(888) 236-2427 

Radisson Hotels & Resorts 
(888) 201-1718 

Ramada Worldwide 

(800) 272-6232 

Hotels & Resorts 
) 236-2427 

Residence Inn 
(888) 236-2427 

Hotels & Resorts 
(800) 542-8680 

Sheraton Hotels & Resorts 

(800) 325-3535 

Staybridge Suites 
mobile . staybridge .com 

(877) 238-8889 

Westin Hotels & Resorts 
(800) 937-8461 

Wingate Inns 
(800) 228-1000 

Woodfin Suite Hotels 
(800) 966-3346 

Wyndham Hotels & Resorts 
(877) 999-3223 

PC Today/ April 2011 77 

he Ben 

by Josh Compton 


The Newest Entry In The 
Pre Series Of Smartphones 

■ The HP Pre 3 is one of the most recent smartphones to emerge from HP's ac- 
quisition of Palm. The phone features a multitouch display, slide-out keyboard, 
5MP camera, and more. HP offers 8GB and 16GB models that support USB mass 
storage. The Pre 3 runs the HP webOS, has GPS capabilities, and provides Wi-Fi 
and Bluetooth connectivity. You can also use the Pre 3 as a mobile hotspot for as 
many as five devices. HP has created a calendar app that can sync data from other 
sources, such as Google and Microsoft Exchange. It also supports multiple email 
accounts and compiles contact information from Linkedln, Facebook, and other 
services to fully flesh out your contact list. The Pre 3 can also handle video confer- 
encing because it has a noise-cancelling speakerphone and a front-facing camera. 
Another interesting feature is HP's Touchstone technology that lets you tap a Pre 3 
and TouchPad together for URL sharing and other added features. 

A Complex Tablet 
With A Simple Name 

■ Notion Ink has set out to create a unique 
product with its Adam tablet, and by the looks 
of it, the company has succeeded. The Adam has a 
10.1-inch multitouch display; a 185-degree, 3.2MP 
autofocus camera that lets you capture pictures in 
nearly any direction, and 8GB of flash memory with 
a MicroSD slot for extra storage. The tablet's transflec- 
tive display and ambient light sensor makes text more 
readable under almost any lighting source. For your 
connectivity needs, the Adam features 3G, Wi-Fi, and 
Bluetooth capabilities, and you can use the built-in GPS 
receiver for navigation purposes. The HDMI output provides 
1080p video and supports Adobe AIR and flash for playing 
stored or Web-based video. And for fun, Notion Ink includes a 
"Bonus mystery feature" that is revealed if you buy the Adam. 

78 April 2011 / 

Lenovo® recommends Windows® 7 Professional. 




: •l|||j|j llll 111 




IPELINES - 450000000 


S ^» 



RATE; 476895004 




Lenovo ThinkPad® T Series 

The new Lenovo ThinkPad T Series. The first line of business 
notebooks with NVIDIA® Optimus™ technology built in. That 
means, blazing-fast graphics performance when you need it and 
power savings when you don't. Combined with superior wireless 
performance and faster processors, these notebooks are the 
ultimate business machines. Small details. A big difference. 


without notice. Lenovo is not respc 
red trademarks of Microsoft Corpor 
and/or registered trademarks of IMV 

iraphic errors. Trademarks; 

Jnited States and other cou 

' HPA Q3 11 19086 LaptopMag 



Innovative, High-Density, 
Energy-Efficient Server Products 

llliaiitLr 1 




(The First of its Kind) 
Keeping IT Green with 
94%+ Power Efficiency 
Running Four Dual Processor 
Computer Nodes (Servers) 
in the Space of Two 

i'*y£ r*4i 



the future of your business depends on it 

www. su per micro . com 

>nge without n-olice. All logos, brand n 
ermisjfon by Supermfcro Corporate M< 

copyrighted arwi may not be reprinted arid/o